76 lines
2.4 KiB
Python
76 lines
2.4 KiB
Python
"""
|
|
Safe version of tarfile.extractall which does not extract any files that would
|
|
be, or symlink to a file that is, outside of the directory extracted in.
|
|
|
|
Adapted from:
|
|
http://stackoverflow.com/questions/10060069/safely-extract-zip-or-tar-using-python
|
|
"""
|
|
import logging
|
|
from os.path import join as joinpath
|
|
from os.path import abspath, dirname, realpath
|
|
|
|
from django.conf import settings
|
|
from django.core.exceptions import SuspiciousOperation
|
|
|
|
log = logging.getLogger(__name__)
|
|
|
|
|
|
def resolved(rpath):
|
|
"""
|
|
Returns the canonical absolute path of `rpath`.
|
|
"""
|
|
return realpath(abspath(rpath))
|
|
|
|
|
|
def _is_bad_path(path, base):
|
|
"""
|
|
Is (the canonical absolute path of) `path` outside `base`?
|
|
"""
|
|
return not resolved(joinpath(base, path)).startswith(base)
|
|
|
|
|
|
def _is_bad_link(info, base):
|
|
"""
|
|
Does the file sym- or hard-link to files outside `base`?
|
|
"""
|
|
# Links are interpreted relative to the directory containing the link
|
|
tip = resolved(joinpath(base, dirname(info.name)))
|
|
return _is_bad_path(info.linkname, base=tip)
|
|
|
|
|
|
def safemembers(members, base):
|
|
"""
|
|
Check that all elements of a tar file are safe.
|
|
"""
|
|
|
|
base = resolved(base)
|
|
|
|
# check that we're not trying to import outside of the data_dir
|
|
if not base.startswith(resolved(settings.DATA_DIR)):
|
|
raise SuspiciousOperation("Attempted to import course outside of data dir")
|
|
|
|
for finfo in members:
|
|
if _is_bad_path(finfo.name, base):
|
|
log.debug("File %r is blocked (illegal path)", finfo.name)
|
|
raise SuspiciousOperation("Illegal path")
|
|
elif finfo.issym() and _is_bad_link(finfo, base):
|
|
log.debug("File %r is blocked: Hard link to %r", finfo.name, finfo.linkname)
|
|
raise SuspiciousOperation("Hard link")
|
|
elif finfo.islnk() and _is_bad_link(finfo, base):
|
|
log.debug("File %r is blocked: Symlink to %r", finfo.name,
|
|
finfo.linkname)
|
|
raise SuspiciousOperation("Symlink")
|
|
elif finfo.isdev():
|
|
log.debug("File %r is blocked: FIFO, device or character file",
|
|
finfo.name)
|
|
raise SuspiciousOperation("Dev file")
|
|
|
|
return members
|
|
|
|
|
|
def safetar_extractall(tar_file, path=".", members=None): # pylint: disable=unused-argument
|
|
"""
|
|
Safe version of `tar_file.extractall()`.
|
|
"""
|
|
return tar_file.extractall(path, safemembers(tar_file, path))
|