Sync with 2.47.3
* maint-2.47: Git 2.47.3 Git 2.46.4 Git 2.45.4 Git 2.44.4 Git 2.43.7 wincred: avoid buffer overflow in wcsncat() bundle-uri: fix arbitrary file writes via parameter injection config: quote values containing CR character git-gui: sanitize 'exec' arguments: convert new 'cygpath' calls git-gui: do not mistake command arguments as redirection operators git-gui: introduce function git_redir for git calls with redirections git-gui: pass redirections as separate argument to git_read git-gui: pass redirections as separate argument to _open_stdout_stderr git-gui: convert git_read*, git_write to be non-variadic git-gui: override exec and open only on Windows gitk: sanitize 'open' arguments: revisit recently updated 'open' calls git-gui: use git_read in githook_read git-gui: sanitize $PATH on all platforms git-gui: break out a separate function git_read_nice git-gui: assure PATH has only absolute elements. git-gui: remove option --stderr from git_read git-gui: cleanup git-bash menu item git-gui: sanitize 'exec' arguments: background git-gui: avoid auto_execok in do_windows_shortcut git-gui: sanitize 'exec' arguments: simple cases git-gui: avoid auto_execok for git-bash menu item git-gui: treat file names beginning with "|" as relative paths git-gui: remove unused proc is_shellscript git-gui: remove git config --list handling for git < 1.5.3 git-gui: remove special treatment of Windows from open_cmd_pipe git-gui: remove HEAD detachment implementation for git < 1.5.3 git-gui: use only the configured shell git-gui: remove Tcl 8.4 workaround on 2>@1 redirection git-gui: make _shellpath usable on startup git-gui: use [is_Windows], not bad _shellpath git-gui: _which, only add .exe suffix if not present gitk: encode arguments correctly with "open" gitk: sanitize 'open' arguments: command pipeline gitk: collect construction of blameargs into a single conditional gitk: sanitize 'open' arguments: simple commands, readable and writable gitk: sanitize 'open' arguments: simple commands with redirections gitk: sanitize 'open' arguments: simple commands gitk: sanitize 'exec' arguments: redirect to process gitk: sanitize 'exec' arguments: redirections and background gitk: sanitize 'exec' arguments: redirections gitk: sanitize 'exec' arguments: 'eval exec' gitk: sanitize 'exec' arguments: simple cases gitk: have callers of diffcmd supply pipe symbol when necessary gitk: treat file names beginning with "|" as relative paths
This commit is contained in:
22
bundle-uri.c
22
bundle-uri.c
@@ -297,6 +297,28 @@ static int download_https_uri_to_file(const char *file, const char *uri)
|
||||
struct strbuf line = STRBUF_INIT;
|
||||
int found_get = 0;
|
||||
|
||||
/*
|
||||
* The protocol we speak with git-remote-https(1) uses a space to
|
||||
* separate between URI and file, so the URI itself must not contain a
|
||||
* space. If it did, an adversary could change the location where the
|
||||
* downloaded file is being written to.
|
||||
*
|
||||
* Similarly, we use newlines to separate commands from one another.
|
||||
* Consequently, neither the URI nor the file must contain a newline or
|
||||
* otherwise an adversary could inject arbitrary commands.
|
||||
*
|
||||
* TODO: Restricting newlines in the target paths may break valid
|
||||
* usecases, even if those are a bit more on the esoteric side.
|
||||
* If this ever becomes a problem we should probably think about
|
||||
* alternatives. One alternative could be to use NUL-delimited
|
||||
* requests in git-remote-http(1). Another alternative could be
|
||||
* to use URL quoting.
|
||||
*/
|
||||
if (strpbrk(uri, " \n"))
|
||||
return error("bundle-uri: URI is malformed: '%s'", file);
|
||||
if (strchr(file, '\n'))
|
||||
return error("bundle-uri: filename is malformed: '%s'", file);
|
||||
|
||||
strvec_pushl(&cp.args, "git-remote-https", uri, NULL);
|
||||
cp.err = -1;
|
||||
cp.in = -1;
|
||||
|
||||
Reference in New Issue
Block a user