Security: audit the server-side code for how it handles symlinks to outside the storage root #8

Open
opened 2022-01-24 21:15:22 +00:00 by reivilibre · 0 comments
Owner

This is worth doing.

let mut open_options = OpenOptions::new();

// IMPORTANT: Don't follow symlinks
open_options.custom_flags(O_NOFOLLOW);

for opening files,

but similar things apply for e.g. reading directories, performing lookups, etc...

This is worth doing. ```rust let mut open_options = OpenOptions::new(); // IMPORTANT: Don't follow symlinks open_options.custom_flags(O_NOFOLLOW); ``` for opening files, but similar things apply for e.g. reading directories, performing lookups, etc...
reivilibre added this to the B: Write functionality milestone 2022-01-24 21:16:17 +00:00
Sign in to join this conversation.
No Label
No project
No Assignees
1 Participants
Notifications
Due Date
The due date is invalid or out of range. Please use the format 'yyyy-mm-dd'.

No due date set.

Dependencies

No dependencies set.

Reference: reivilibre/olivefs#8
No description provided.