File: file_decompression.rb

package info (click to toggle)
gitlab 17.6.5-19
  • links: PTS, VCS
  • area: main
  • in suites: sid
  • size: 629,368 kB
  • sloc: ruby: 1,915,304; javascript: 557,307; sql: 60,639; xml: 6,509; sh: 4,567; makefile: 1,239; python: 406
file content (45 lines) | stat: -rw-r--r-- 1,138 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
# frozen_string_literal: true

module RuboCop
  module Cop
    # Check for symlinks when extracting files to avoid arbitrary file reading.
    class FileDecompression < RuboCop::Cop::Base
      MSG = <<~EOF
      While extracting files check for symlink to avoid arbitrary file reading.
      https://gitlab.com/gitlab-com/gl-infra/production/-/issues/6132
      EOF

      def_node_matcher :system?, <<~PATTERN
        (send {nil? | const} {:system | :exec | :spawn | :popen}
          (str $_))
      PATTERN

      def_node_matcher :subshell?, <<~PATTERN
        (xstr
          (str $_))
      PATTERN

      FORBIDDEN_COMMANDS = %w[gunzip gzip zip tar].freeze

      def on_xstr(node)
        subshell?(node) do |match|
          add_offense(node, message: MSG) if forbidden_command?(match)
        end
      end

      def on_send(node)
        system?(node) do |match|
          add_offense(node, message: MSG) if forbidden_command?(match)
        end
      end

      private

      def forbidden_command?(cmd)
        FORBIDDEN_COMMANDS.any? do |forbidden|
          cmd.match?(forbidden)
        end
      end
    end
  end
end