]> git.ipfire.org Git - thirdparty/vim.git/commitdiff
patch 9.1.1198: [security]: potential data loss with zip.vim v9.1.1198
authorChristian Brabandt <cb@256bit.org>
Wed, 12 Mar 2025 21:04:01 +0000 (22:04 +0100)
committerChristian Brabandt <cb@256bit.org>
Wed, 12 Mar 2025 21:04:01 +0000 (22:04 +0100)
Problem:  [security]: potential data loss with zip.vim and special
          crafted zip files (RyotaK)
Solution: use glob '[-]' to protect filenames starting with '-'

Github Advisory:
https://github.com/vim/vim/security/advisories/GHSA-693p-m996-3rmf

Signed-off-by: Christian Brabandt <cb@256bit.org>
Filelist
runtime/autoload/zip.vim
src/testdir/samples/poc.zip [new file with mode: 0644]
src/testdir/test_plugin_zip.vim
src/version.c

index c1487af57411fbe16dd0441da2bcb94bc55cd2c4..f2797efe2f0e5854a10c63a2f0f1d118ade66692 100644 (file)
--- a/Filelist
+++ b/Filelist
@@ -223,6 +223,7 @@ SRC_ALL =   \
                src/testdir/samples/*.html \
                src/testdir/samples/*.txt \
                src/testdir/samples/*.vim \
+               src/testdir/samples/poc.zip \
                src/testdir/samples/test000 \
                src/testdir/samples/test.zip \
                src/testdir/samples/test_undo.txt.undo \
index 4a53fc5f28656aa7bae886240e06a57702bde7e2..dae4ddeb9921eeb8582eabb3d4defd0960a66f1a 100644 (file)
@@ -14,6 +14,7 @@
 " 2024 Aug 05 by Vim Project: clean-up and make it work with shellslash on Windows
 " 2024 Aug 18 by Vim Project: correctly handle special globbing chars
 " 2024 Aug 21 by Vim Project: simplify condition to detect MS-Windows
+" 2025 Mar 11 by Vim Project: handle filenames with leading '-' correctly
 " License:     Vim License  (see vim's :help license)
 " Copyright:   Copyright (C) 2005-2019 Charles E. Campbell {{{1
 "              Permission is hereby granted to use and distribute this code,
@@ -343,6 +344,11 @@ fun! zip#Extract()
    return
   endif
   let target = fname->substitute('\[', '[[]', 'g')
+  " unzip 6.0 does not support -- to denote end-of-arguments
+  " unzip 6.1 (2010) apparently supports, it, but hasn't been released
+  " so the workaround is to use glob '[-]' so that it won't be considered an argument
+  " else, it would be possible to use 'unzip -o <file.zip> '-d/tmp' to extract the whole archive
+  let target = target->substitute('^-', '[&]', '')
   if &shell =~ 'cmd' && has("win32")
     let target = target
                \ ->substitute('[?*]', '[&]', 'g')
diff --git a/src/testdir/samples/poc.zip b/src/testdir/samples/poc.zip
new file mode 100644 (file)
index 0000000..8b2b44b
Binary files /dev/null and b/src/testdir/samples/poc.zip differ
index e831f263456026e5dae7503810753cd7514214d2..2050b4ce101779ee47a338c7fcfc494e91e43694 100644 (file)
@@ -235,3 +235,26 @@ def Test_zip_glob_fname()
 
   bw
 enddef
+
+def Test_zip_fname_leading_hyphen()
+  CheckNotMSWindows
+
+  ### copy sample zip file
+  if !filecopy("samples/poc.zip", "X.zip")
+    assert_report("Can't copy samples/poc.zip")
+    return
+  endif
+  defer delete("X.zip")
+  defer delete('-d', 'rf')
+  defer delete('/tmp/pwned', 'rf')
+
+  e X.zip
+
+  :1
+  var fname = '-d/tmp'
+  search('\V' .. fname)
+  normal x
+  assert_true(filereadable('-d/tmp'))
+  assert_false(filereadable('/tmp/pwned'))
+  bw
+enddef
index 65332f5e9a1503671165b2b400f50155e5f35e56..265081a8350f1bc80ef15a3340fda07f3c648e77 100644 (file)
@@ -704,6 +704,8 @@ static char *(features[]) =
 
 static int included_patches[] =
 {   /* Add new patch number below this line */
+/**/
+    1198,
 /**/
     1197,
 /**/