Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

path security restrictions should be enforced #17

Open
OriHoch opened this issue Jun 29, 2017 · 0 comments
Open

path security restrictions should be enforced #17

OriHoch opened this issue Jun 29, 2017 · 0 comments

Comments

@OriHoch
Copy link
Collaborator

OriHoch commented Jun 29, 2017

from latest data resource spec:

SECURITY: / (absolute path) and ../ (relative parent path) are forbidden to avoid security vulnerabilities when implementing data package tools. These limitations on resource path ensure that resource paths only point to files within the data package directory and its subdirectories. This prevents data package tools being exploited by a malicious user to gain unintended access to sensitive information. For example, suppose a data package hosting service stores packages on disk and allows access via an API. A malicious user uploads a data package with a resource path like /etc/passwd. The user then requests the data for that resource and the server naively opens /etc/passwd and returns that data to the caller.

@OriHoch OriHoch self-assigned this Jun 29, 2017
@OriHoch OriHoch added this to the Current milestone Jun 29, 2017
@roll roll modified the milestones: Current, Version-1 Nov 10, 2017
@roll roll removed the specs-update label May 20, 2019
@roll roll added the contribute label Oct 2, 2019
@OriHoch OriHoch removed their assignment Oct 6, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

3 participants