2016-03-21 01:51:17 +00:00
|
|
|
import os
|
|
|
|
|
2021-04-14 16:23:44 +00:00
|
|
|
from django.core.exceptions import SuspiciousFileOperation
|
2016-03-21 01:51:17 +00:00
|
|
|
from django.core.files.base import ContentFile
|
2021-04-14 16:23:44 +00:00
|
|
|
from django.core.files.storage import FileSystemStorage, Storage
|
2016-03-21 01:51:17 +00:00
|
|
|
from django.db.models import FileField
|
|
|
|
from django.test import SimpleTestCase
|
|
|
|
|
|
|
|
|
|
|
|
class AWSS3Storage(Storage):
|
|
|
|
"""
|
|
|
|
Simulate an AWS S3 storage which uses Unix-like paths and allows any
|
|
|
|
characters in file names but where there aren't actual folders but just
|
|
|
|
keys.
|
|
|
|
"""
|
2022-02-03 19:24:19 +00:00
|
|
|
|
2016-03-21 01:51:17 +00:00
|
|
|
prefix = "mys3folder/"
|
|
|
|
|
|
|
|
def _save(self, name, content):
|
|
|
|
"""
|
|
|
|
This method is important to test that Storage.save() doesn't replace
|
|
|
|
'\' with '/' (rather FileSystemStorage.save() does).
|
|
|
|
"""
|
|
|
|
return name
|
|
|
|
|
|
|
|
def get_valid_name(self, name):
|
|
|
|
return name
|
|
|
|
|
|
|
|
def get_available_name(self, name, max_length=None):
|
|
|
|
return name
|
|
|
|
|
|
|
|
def generate_filename(self, filename):
|
|
|
|
"""
|
|
|
|
This is the method that's important to override when using S3 so that
|
|
|
|
os.path() isn't called, which would break S3 keys.
|
|
|
|
"""
|
|
|
|
return self.prefix + self.get_valid_name(filename)
|
|
|
|
|
|
|
|
|
2024-05-10 11:51:47 +00:00
|
|
|
class StorageGenerateFilenameTests(SimpleTestCase):
|
|
|
|
"""Tests for base Storage's generate_filename method."""
|
|
|
|
|
|
|
|
storage_class = Storage
|
|
|
|
|
|
|
|
def test_valid_names(self):
|
|
|
|
storage = self.storage_class()
|
|
|
|
name = "UnTRIVíAL @fil$ena#me!"
|
|
|
|
valid_name = storage.get_valid_name(name)
|
|
|
|
candidates = [
|
|
|
|
(name, valid_name),
|
|
|
|
(f"././././././{name}", valid_name),
|
|
|
|
(f"some/path/{name}", f"some/path/{valid_name}"),
|
|
|
|
(f"some/./path/./{name}", f"some/path/{valid_name}"),
|
|
|
|
(f"././some/././path/./{name}", f"some/path/{valid_name}"),
|
|
|
|
(f".\\.\\.\\.\\.\\.\\{name}", valid_name),
|
|
|
|
(f"some\\path\\{name}", f"some/path/{valid_name}"),
|
|
|
|
(f"some\\.\\path\\.\\{name}", f"some/path/{valid_name}"),
|
|
|
|
(f".\\.\\some\\.\\.\\path\\.\\{name}", f"some/path/{valid_name}"),
|
|
|
|
]
|
|
|
|
for name, expected in candidates:
|
|
|
|
with self.subTest(name=name):
|
|
|
|
result = storage.generate_filename(name)
|
|
|
|
self.assertEqual(result, os.path.normpath(expected))
|
|
|
|
|
|
|
|
|
|
|
|
class FileSystemStorageGenerateFilenameTests(StorageGenerateFilenameTests):
|
|
|
|
|
|
|
|
storage_class = FileSystemStorage
|
|
|
|
|
|
|
|
|
2016-03-21 01:51:17 +00:00
|
|
|
class GenerateFilenameStorageTests(SimpleTestCase):
|
2021-04-14 16:23:44 +00:00
|
|
|
def test_storage_dangerous_paths(self):
|
|
|
|
candidates = [
|
|
|
|
("/tmp/..", ".."),
|
2024-05-10 11:51:47 +00:00
|
|
|
("\\tmp\\..", ".."),
|
2021-04-14 16:23:44 +00:00
|
|
|
("/tmp/.", "."),
|
2024-05-10 11:51:47 +00:00
|
|
|
("\\tmp\\.", "."),
|
|
|
|
("..", ".."),
|
|
|
|
(".", "."),
|
2021-04-14 16:23:44 +00:00
|
|
|
("", ""),
|
|
|
|
]
|
|
|
|
s = FileSystemStorage()
|
2024-07-16 08:41:20 +00:00
|
|
|
s_overwrite = FileSystemStorage(allow_overwrite=True)
|
2021-04-14 16:23:44 +00:00
|
|
|
msg = "Could not derive file name from '%s'"
|
|
|
|
for file_name, base_name in candidates:
|
|
|
|
with self.subTest(file_name=file_name):
|
|
|
|
with self.assertRaisesMessage(SuspiciousFileOperation, msg % base_name):
|
|
|
|
s.get_available_name(file_name)
|
2024-07-16 08:41:20 +00:00
|
|
|
with self.assertRaisesMessage(SuspiciousFileOperation, msg % base_name):
|
|
|
|
s_overwrite.get_available_name(file_name)
|
2021-04-14 16:23:44 +00:00
|
|
|
with self.assertRaisesMessage(SuspiciousFileOperation, msg % base_name):
|
|
|
|
s.generate_filename(file_name)
|
|
|
|
|
|
|
|
def test_storage_dangerous_paths_dir_name(self):
|
2021-12-17 20:07:50 +00:00
|
|
|
candidates = [
|
2024-05-10 11:51:47 +00:00
|
|
|
("../path", ".."),
|
|
|
|
("..\\path", ".."),
|
2021-12-17 20:07:50 +00:00
|
|
|
("tmp/../path", "tmp/.."),
|
|
|
|
("tmp\\..\\path", "tmp/.."),
|
|
|
|
("/tmp/../path", "/tmp/.."),
|
|
|
|
("\\tmp\\..\\path", "/tmp/.."),
|
|
|
|
]
|
2021-04-14 16:23:44 +00:00
|
|
|
s = FileSystemStorage()
|
2024-07-16 08:41:20 +00:00
|
|
|
s_overwrite = FileSystemStorage(allow_overwrite=True)
|
2021-12-17 20:07:50 +00:00
|
|
|
for file_name, path in candidates:
|
|
|
|
msg = "Detected path traversal attempt in '%s'" % path
|
|
|
|
with self.subTest(file_name=file_name):
|
|
|
|
with self.assertRaisesMessage(SuspiciousFileOperation, msg):
|
|
|
|
s.get_available_name(file_name)
|
2024-07-16 08:41:20 +00:00
|
|
|
with self.assertRaisesMessage(SuspiciousFileOperation, msg):
|
|
|
|
s_overwrite.get_available_name(file_name)
|
2021-12-17 20:07:50 +00:00
|
|
|
with self.assertRaisesMessage(SuspiciousFileOperation, msg):
|
|
|
|
s.generate_filename(file_name)
|
2021-04-14 16:23:44 +00:00
|
|
|
|
|
|
|
def test_filefield_dangerous_filename(self):
|
2021-05-13 06:53:44 +00:00
|
|
|
candidates = [
|
|
|
|
("..", "some/folder/.."),
|
|
|
|
(".", "some/folder/."),
|
|
|
|
("", "some/folder/"),
|
|
|
|
("???", "???"),
|
|
|
|
("$.$.$", "$.$.$"),
|
|
|
|
]
|
2021-04-14 16:23:44 +00:00
|
|
|
f = FileField(upload_to="some/folder/")
|
2021-05-13 06:53:44 +00:00
|
|
|
for file_name, msg_file_name in candidates:
|
|
|
|
msg = f"Could not derive file name from '{msg_file_name}'"
|
2021-04-14 16:23:44 +00:00
|
|
|
with self.subTest(file_name=file_name):
|
2021-05-13 06:53:44 +00:00
|
|
|
with self.assertRaisesMessage(SuspiciousFileOperation, msg):
|
2021-04-14 16:23:44 +00:00
|
|
|
f.generate_filename(None, file_name)
|
|
|
|
|
2021-05-13 06:53:44 +00:00
|
|
|
def test_filefield_dangerous_filename_dot_segments(self):
|
2021-04-14 16:23:44 +00:00
|
|
|
f = FileField(upload_to="some/folder/")
|
2021-05-13 06:53:44 +00:00
|
|
|
msg = "Detected path traversal attempt in 'some/folder/../path'"
|
2021-04-14 16:23:44 +00:00
|
|
|
with self.assertRaisesMessage(SuspiciousFileOperation, msg):
|
2021-05-13 06:53:44 +00:00
|
|
|
f.generate_filename(None, "../path")
|
|
|
|
|
|
|
|
def test_filefield_generate_filename_absolute_path(self):
|
|
|
|
f = FileField(upload_to="some/folder/")
|
|
|
|
candidates = [
|
|
|
|
"/tmp/path",
|
|
|
|
"/tmp/../path",
|
|
|
|
]
|
|
|
|
for file_name in candidates:
|
|
|
|
msg = f"Detected path traversal attempt in '{file_name}'"
|
|
|
|
with self.subTest(file_name=file_name):
|
|
|
|
with self.assertRaisesMessage(SuspiciousFileOperation, msg):
|
|
|
|
f.generate_filename(None, file_name)
|
2016-03-21 01:51:17 +00:00
|
|
|
|
|
|
|
def test_filefield_generate_filename(self):
|
|
|
|
f = FileField(upload_to="some/folder/")
|
|
|
|
self.assertEqual(
|
|
|
|
f.generate_filename(None, "test with space.txt"),
|
|
|
|
os.path.normpath("some/folder/test_with_space.txt"),
|
|
|
|
)
|
|
|
|
|
|
|
|
def test_filefield_generate_filename_with_upload_to(self):
|
|
|
|
def upload_to(instance, filename):
|
|
|
|
return "some/folder/" + filename
|
|
|
|
|
|
|
|
f = FileField(upload_to=upload_to)
|
|
|
|
self.assertEqual(
|
|
|
|
f.generate_filename(None, "test with space.txt"),
|
|
|
|
os.path.normpath("some/folder/test_with_space.txt"),
|
|
|
|
)
|
|
|
|
|
2021-05-13 06:53:44 +00:00
|
|
|
def test_filefield_generate_filename_upload_to_overrides_dangerous_filename(self):
|
|
|
|
def upload_to(instance, filename):
|
|
|
|
return "test.txt"
|
|
|
|
|
|
|
|
f = FileField(upload_to=upload_to)
|
|
|
|
candidates = [
|
|
|
|
"/tmp/.",
|
|
|
|
"/tmp/..",
|
|
|
|
"/tmp/../path",
|
|
|
|
"/tmp/path",
|
|
|
|
"some/folder/",
|
|
|
|
"some/folder/.",
|
|
|
|
"some/folder/..",
|
|
|
|
"some/folder/???",
|
|
|
|
"some/folder/$.$.$",
|
|
|
|
"some/../test.txt",
|
|
|
|
"",
|
|
|
|
]
|
|
|
|
for file_name in candidates:
|
|
|
|
with self.subTest(file_name=file_name):
|
|
|
|
self.assertEqual(f.generate_filename(None, file_name), "test.txt")
|
|
|
|
|
|
|
|
def test_filefield_generate_filename_upload_to_absolute_path(self):
|
|
|
|
def upload_to(instance, filename):
|
|
|
|
return "/tmp/" + filename
|
|
|
|
|
|
|
|
f = FileField(upload_to=upload_to)
|
|
|
|
candidates = [
|
|
|
|
"path",
|
|
|
|
"../path",
|
|
|
|
"???",
|
|
|
|
"$.$.$",
|
|
|
|
]
|
|
|
|
for file_name in candidates:
|
|
|
|
msg = f"Detected path traversal attempt in '/tmp/{file_name}'"
|
|
|
|
with self.subTest(file_name=file_name):
|
|
|
|
with self.assertRaisesMessage(SuspiciousFileOperation, msg):
|
|
|
|
f.generate_filename(None, file_name)
|
|
|
|
|
|
|
|
def test_filefield_generate_filename_upload_to_dangerous_filename(self):
|
|
|
|
def upload_to(instance, filename):
|
|
|
|
return "/tmp/" + filename
|
|
|
|
|
|
|
|
f = FileField(upload_to=upload_to)
|
|
|
|
candidates = ["..", ".", ""]
|
|
|
|
for file_name in candidates:
|
|
|
|
msg = f"Could not derive file name from '/tmp/{file_name}'"
|
|
|
|
with self.subTest(file_name=file_name):
|
|
|
|
with self.assertRaisesMessage(SuspiciousFileOperation, msg):
|
|
|
|
f.generate_filename(None, file_name)
|
|
|
|
|
2016-03-21 01:51:17 +00:00
|
|
|
def test_filefield_awss3_storage(self):
|
|
|
|
"""
|
|
|
|
Simulate a FileField with an S3 storage which uses keys rather than
|
|
|
|
folders and names. FileField and Storage shouldn't have any os.path()
|
|
|
|
calls that break the key.
|
|
|
|
"""
|
|
|
|
storage = AWSS3Storage()
|
|
|
|
folder = "not/a/folder/"
|
|
|
|
|
|
|
|
f = FileField(upload_to=folder, storage=storage)
|
|
|
|
key = "my-file-key\\with odd characters"
|
|
|
|
data = ContentFile("test")
|
|
|
|
expected_key = AWSS3Storage.prefix + folder + key
|
|
|
|
|
|
|
|
# Simulate call to f.save()
|
|
|
|
result_key = f.generate_filename(None, key)
|
|
|
|
self.assertEqual(result_key, expected_key)
|
|
|
|
|
|
|
|
result_key = storage.save(result_key, data)
|
|
|
|
self.assertEqual(result_key, expected_key)
|
|
|
|
|
|
|
|
# Repeat test with a callable.
|
|
|
|
def upload_to(instance, filename):
|
|
|
|
# Return a non-normalized path on purpose.
|
|
|
|
return folder + filename
|
|
|
|
|
|
|
|
f = FileField(upload_to=upload_to, storage=storage)
|
|
|
|
|
|
|
|
# Simulate call to f.save()
|
|
|
|
result_key = f.generate_filename(None, key)
|
|
|
|
self.assertEqual(result_key, expected_key)
|
|
|
|
|
|
|
|
result_key = storage.save(result_key, data)
|
|
|
|
self.assertEqual(result_key, expected_key)
|