Blame libarchive/test/test_write_disk_secure744.c

Packit Service 1d0348
/*-
Packit Service 1d0348
 * Copyright (c) 2003-2007,2016 Tim Kientzle
Packit Service 1d0348
 * All rights reserved.
Packit Service 1d0348
 *
Packit Service 1d0348
 * Redistribution and use in source and binary forms, with or without
Packit Service 1d0348
 * modification, are permitted provided that the following conditions
Packit Service 1d0348
 * are met:
Packit Service 1d0348
 * 1. Redistributions of source code must retain the above copyright
Packit Service 1d0348
 *    notice, this list of conditions and the following disclaimer.
Packit Service 1d0348
 * 2. Redistributions in binary form must reproduce the above copyright
Packit Service 1d0348
 *    notice, this list of conditions and the following disclaimer in the
Packit Service 1d0348
 *    documentation and/or other materials provided with the distribution.
Packit Service 1d0348
 *
Packit Service 1d0348
 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) ``AS IS'' AND ANY EXPRESS OR
Packit Service 1d0348
 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
Packit Service 1d0348
 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
Packit Service 1d0348
 * IN NO EVENT SHALL THE AUTHOR(S) BE LIABLE FOR ANY DIRECT, INDIRECT,
Packit Service 1d0348
 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
Packit Service 1d0348
 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
Packit Service 1d0348
 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
Packit Service 1d0348
 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
Packit Service 1d0348
 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
Packit Service 1d0348
 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Packit Service 1d0348
 */
Packit Service 1d0348
#include "test.h"
Packit Service 1d0348
__FBSDID("$FreeBSD$");
Packit Service 1d0348
Packit Service 1d0348
#define UMASK 022
Packit Service 1d0348
Packit Service 1d0348
/*
Packit Service 1d0348
 * Github Issue #744 describes a bug in the sandboxing code that
Packit Service 1d0348
 * causes very long pathnames to not get checked for symlinks.
Packit Service 1d0348
 */
Packit Service 1d0348
Packit Service 1d0348
DEFINE_TEST(test_write_disk_secure744)
Packit Service 1d0348
{
Packit Service 1d0348
#if defined(_WIN32) && !defined(__CYGWIN__)
Packit Service 1d0348
	skipping("archive_write_disk security checks not supported on Windows");
Packit Service 1d0348
#else
Packit Service 1d0348
	struct archive *a;
Packit Service 1d0348
	struct archive_entry *ae;
Packit Service 1d0348
	size_t buff_size = 8192;
Packit Service 1d0348
	char *buff = malloc(buff_size);
Packit Service 1d0348
	char *p = buff;
Packit Service 1d0348
	int n = 0;
Packit Service 1d0348
	int t;
Packit Service 1d0348
Packit Service 1d0348
	assert(buff != NULL);
Packit Service 1d0348
Packit Service 1d0348
	/* Start with a known umask. */
Packit Service 1d0348
	assertUmask(UMASK);
Packit Service 1d0348
Packit Service 1d0348
	/* Create an archive_write_disk object. */
Packit Service 1d0348
	assert((a = archive_write_disk_new()) != NULL);
Packit Service 1d0348
	archive_write_disk_set_options(a, ARCHIVE_EXTRACT_SECURE_SYMLINKS);
Packit Service 1d0348
Packit Service 1d0348
	while (p + 500 < buff + buff_size) {
Packit Service 1d0348
		memset(p, 'x', 100);
Packit Service 1d0348
		p += 100;
Packit Service 1d0348
		p[0] = '\0';
Packit Service 1d0348
Packit Service 1d0348
		buff[0] = ((n / 1000) % 10) + '0';
Packit Service 1d0348
		buff[1] = ((n / 100) % 10)+ '0';
Packit Service 1d0348
		buff[2] = ((n / 10) % 10)+ '0';
Packit Service 1d0348
		buff[3] = ((n / 1) % 10)+ '0';
Packit Service 1d0348
		buff[4] = '_';
Packit Service 1d0348
		++n;
Packit Service 1d0348
Packit Service 1d0348
		/* Create a symlink pointing to the testworkdir */
Packit Service 1d0348
		assert((ae = archive_entry_new()) != NULL);
Packit Service 1d0348
		archive_entry_copy_pathname(ae, buff);
Packit Service 1d0348
		archive_entry_set_mode(ae, S_IFREG | 0777);
Packit Service 1d0348
		archive_entry_copy_symlink(ae, testworkdir);
Packit Service 1d0348
		assertEqualIntA(a, ARCHIVE_OK, archive_write_header(a, ae));
Packit Service 1d0348
		archive_entry_free(ae);
Packit Service 1d0348
Packit Service 1d0348
		*p++ = '/';
Packit Service 1d0348
		sprintf(p, "target%d", n);
Packit Service 1d0348
Packit Service 1d0348
		/* Try to create a file through the symlink, should fail. */
Packit Service 1d0348
		assert((ae = archive_entry_new()) != NULL);
Packit Service 1d0348
		archive_entry_copy_pathname(ae, buff);
Packit Service 1d0348
		archive_entry_set_mode(ae, S_IFDIR | 0777);
Packit Service 1d0348
Packit Service 1d0348
		t = archive_write_header(a, ae);
Packit Service 1d0348
		archive_entry_free(ae);
Packit Service 1d0348
		failure("Attempt to create target%d via %d-character symlink should have failed", n, (int)strlen(buff));
Packit Service 1d0348
		if(!assertEqualInt(ARCHIVE_FAILED, t)) {
Packit Service 1d0348
			break;
Packit Service 1d0348
		}
Packit Service 1d0348
	}
Packit Service 1d0348
	archive_free(a);
Packit Service 1d0348
	free(buff);
Packit Service 1d0348
#endif
Packit Service 1d0348
}