mirror of
https://git.tartarus.org/simon/putty.git
synced 2025-03-22 14:39:24 -05:00
Ooh. Actually, that vulnerability is further-reaching than I
thought. As well as the ".." attack in recursive copies, the name sent by the client was also trusted in a single-file implicit- destination copy such as "pscp host:foo .". (The result was ./foo, where foo is what the server claimed the file was rather than what the user asked for. I think it's not unreasonable that if the user requests file `foo' from the host, he should get the result in a file called `foo' no matter what the host thinks.) [originally from svn r743]
This commit is contained in:
parent
b78c5699d1
commit
882f653081
15
scp.c
15
scp.c
@ -65,7 +65,7 @@ static char *gui_hwnd = NULL;
|
|||||||
|
|
||||||
static void source(char *src);
|
static void source(char *src);
|
||||||
static void rsource(char *src);
|
static void rsource(char *src);
|
||||||
static void sink(char *targ);
|
static void sink(char *targ, char *src);
|
||||||
/* GUI Adaptation - Sept 2000 */
|
/* GUI Adaptation - Sept 2000 */
|
||||||
static void tell_char(FILE *stream, char c);
|
static void tell_char(FILE *stream, char c);
|
||||||
static void tell_str(FILE *stream, char *str);
|
static void tell_str(FILE *stream, char *str);
|
||||||
@ -754,7 +754,7 @@ static void rsource(char *src)
|
|||||||
/*
|
/*
|
||||||
* Execute the sink part of the SCP protocol.
|
* Execute the sink part of the SCP protocol.
|
||||||
*/
|
*/
|
||||||
static void sink(char *targ)
|
static void sink(char *targ, char *src)
|
||||||
{
|
{
|
||||||
char buf[2048];
|
char buf[2048];
|
||||||
char namebuf[2048];
|
char namebuf[2048];
|
||||||
@ -822,6 +822,13 @@ static void sink(char *targ)
|
|||||||
|
|
||||||
if (sscanf(buf+1, "%u %lu %[^\n]", &mode, &size, namebuf) != 3)
|
if (sscanf(buf+1, "%u %lu %[^\n]", &mode, &size, namebuf) != 3)
|
||||||
bump("Protocol error: Illegal file descriptor format");
|
bump("Protocol error: Illegal file descriptor format");
|
||||||
|
/* Security fix: ensure the file ends up where we asked for it. */
|
||||||
|
if (src) {
|
||||||
|
char *p = src + strlen(src);
|
||||||
|
while (p > src && p[-1] != '/' && p[-1] != '\\')
|
||||||
|
p--;
|
||||||
|
strcpy(namebuf, p);
|
||||||
|
}
|
||||||
if (targisdir) {
|
if (targisdir) {
|
||||||
char t[2048];
|
char t[2048];
|
||||||
char *p;
|
char *p;
|
||||||
@ -851,7 +858,7 @@ static void sink(char *targ)
|
|||||||
continue;
|
continue;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
sink(namebuf);
|
sink(namebuf, NULL);
|
||||||
/* can we set the timestamp for directories ? */
|
/* can we set the timestamp for directories ? */
|
||||||
continue;
|
continue;
|
||||||
}
|
}
|
||||||
@ -1064,7 +1071,7 @@ static void tolocal(int argc, char *argv[])
|
|||||||
do_cmd(host, user, cmd);
|
do_cmd(host, user, cmd);
|
||||||
sfree(cmd);
|
sfree(cmd);
|
||||||
|
|
||||||
sink(targ);
|
sink(targ, src);
|
||||||
}
|
}
|
||||||
|
|
||||||
/*
|
/*
|
||||||
|
Loading…
x
Reference in New Issue
Block a user