Avoid allowing access to unintended directories or files
Cette page n'est pas encore disponible en français, sa traduction est en cours.
Si vous avez des questions ou des retours sur notre projet de traduction actuel,
n'hésitez pas à nous contacter.
ID: javascript-express/path-traversal
Language: JavaScript
Severity: Warning
Category: Security
CWE: 22
By not sanitizing user input prior to using it in path resolution methods you open your application’s access to unintended directories and files.
If you’re using replace
on a user input, this rule will assume you’ve done so correctly and will not report a violation
const path = require("path");
app.get("/", (req, res) => {
path.join("/user/", req.params.path)
var pathname = path.join("/public/", req.body.foo)
path.resolve(pathname)
path.resolve(__dirname, req.body.foo)
path.resolve(__dirname, `${req.body.foo}`)
})
const path = require("path");
app.get("/", (req, res) => {
path.join("/user/", req.params.path.replace(/^(\.\.(\/|\\|$))+/, ''))
var pathname = path.join("/public/", req.body.foo.replace(/^(\.\.(\/|\\|$))+/, ''))
path.resolve(pathname)
path.resolve(__dirname, req.body.foo.replace(/^(\.\.(\/|\\|$))+/, ''))
path.resolve(__dirname, `${req.body.foo.replace(/^(\.\.(\/|\\|$))+/, '')}`)
})