Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Commit a56113e

Browse files
This change adds a check during reference resolving to see if the requested reference is inside the current repository folder. If it's ouside, it raises an exception. This fixes CVE-2023-41040, which allows an attacker to access files outside the repository's directory.
1 parent 91b464c commit a56113e

File tree

1 file changed

+8
-1
lines changed

1 file changed

+8
-1
lines changed

‎git/refs/symbolic.py

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,5 @@
11
from git.types import PathLike
2+
from pathlib import Path
23
import os
34

45
from git.compat import defenc
@@ -171,7 +172,13 @@ def _get_ref_info_helper(
171172
tokens: Union[None, List[str], Tuple[str, str]] = None
172173
repodir = _git_dir(repo, ref_path)
173174
try:
174-
with open(os.path.join(repodir, str(ref_path)), "rt", encoding="UTF-8") as fp:
175+
# Make path absolute, resolving any symlinks, and check that we are still
176+
# inside the repository
177+
full_ref_path = Path(repodir, str(ref_path)).resolve()
178+
if Path(repodir).resolve() not in full_ref_path.parents:
179+
raise ValueError(f"Reference at {full_ref_path} is outside the repo directory")
180+
181+
with open(full_ref_path, "rt", encoding="UTF-8") as fp:
175182
value = fp.read().rstrip()
176183
# Don't only split on spaces, but on whitespace, which allows to parse lines like
177184
# 60b64ef992065e2600bfef6187a97f92398a9144 branch 'master' of git-server:/path/to/repo

0 commit comments

Comments
(0)

AltStyle によって変換されたページ (->オリジナル) /