From 8b920b4ac80bf9d7c4193ecff9046b4ae95502e4 Mon Sep 17 00:00:00 2001 From: nobu Date: Tue, 23 Jun 2009 12:28:16 +0000 Subject: * file.c (rb_get_path_check): check with given safe level. * file.c (rb_find_file_ext_safe, rb_find_file_safe): ditto. * safe.c (rb_insecure_operation): function to raise security error. git-svn-id: svn+ssh://ci.ruby-lang.org/ruby/trunk@23831 b2dd03c8-39d4-4d8f-98ff-823fe69b080e --- file.c | 18 +++++++++++------- include/ruby/ruby.h | 1 + safe.c | 20 +++++++++++++------- 3 files changed, 25 insertions(+), 14 deletions(-) diff --git a/file.c b/file.c index dbb7f1bcb2..98a203239f 100644 --- a/file.c +++ b/file.c @@ -101,13 +101,17 @@ VALUE rb_cFile; VALUE rb_mFileTest; VALUE rb_cStat; +#define insecure_obj_p(obj, level) (level >= 4 || (level > 0 && OBJ_TAINTED(obj))) + static VALUE -rb_get_path_check(VALUE obj, int check) +rb_get_path_check(VALUE obj, int level) { VALUE tmp; ID to_path; - if (check) rb_check_safe_obj(obj); + if (insecure_obj_p(obj, level)) { + rb_insecure_operation(); + } tmp = rb_check_string_type(obj); if (!NIL_P(tmp)) goto exit; @@ -120,8 +124,8 @@ rb_get_path_check(VALUE obj, int check) } exit: StringValueCStr(tmp); - if (check && obj != tmp) { - rb_check_safe_obj(tmp); + if (obj != tmp && insecure_obj_p(tmp, level)) { + rb_insecure_operation(); } return rb_str_new4(tmp); } @@ -135,7 +139,7 @@ rb_get_path_no_checksafe(VALUE obj) VALUE rb_get_path(VALUE obj) { - return rb_get_path_check(obj, 1); + return rb_get_path_check(obj, rb_safe_level()); } static long @@ -4673,7 +4677,7 @@ rb_find_file_ext_safe(VALUE *filep, const char *const *ext, int safe_level) for (i = 0; i < RARRAY_LEN(load_path); i++) { VALUE str = RARRAY_PTR(load_path)[i]; - FilePathValue(str); + RB_GC_GUARD(str) = rb_get_path_check(str, safe_level); if (RSTRING_LEN(str) == 0) continue; file_expand_path(fname, str, 0, tmp); if (file_load_ok(RSTRING_PTR(tmp))) { @@ -4732,7 +4736,7 @@ rb_find_file_safe(VALUE path, int safe_level) tmp = rb_str_tmp_new(MAXPATHLEN + 2); for (i = 0; i < RARRAY_LEN(load_path); i++) { VALUE str = RARRAY_PTR(load_path)[i]; - FilePathValue(str); + RB_GC_GUARD(str) = rb_get_path_check(str, safe_level); if (RSTRING_LEN(str) > 0) { file_expand_path(path, str, 0, tmp); f = RSTRING_PTR(tmp); diff --git a/include/ruby/ruby.h b/include/ruby/ruby.h index 9da3f5b9fd..98a2264c25 100644 --- a/include/ruby/ruby.h +++ b/include/ruby/ruby.h @@ -427,6 +427,7 @@ int rb_safe_level(void); void rb_set_safe_level(int); void rb_set_safe_level_force(int); void rb_secure_update(VALUE); +NORETURN(void rb_insecure_operation(void)); VALUE rb_errinfo(void); void rb_set_errinfo(VALUE); diff --git a/safe.c b/safe.c index ebe62f4206..bb725e1394 100644 --- a/safe.c +++ b/safe.c @@ -97,17 +97,23 @@ rb_secure_update(VALUE obj) rb_secure(4); } +void +rb_insecure_operation(void) +{ + if (rb_frame_callee()) { + rb_raise(rb_eSecurityError, "Insecure operation - %s", + rb_id2name(rb_frame_callee())); + } + else { + rb_raise(rb_eSecurityError, "Insecure operation: -r"); + } +} + void rb_check_safe_obj(VALUE x) { if (rb_safe_level() > 0 && OBJ_TAINTED(x)) { - if (rb_frame_callee()) { - rb_raise(rb_eSecurityError, "Insecure operation - %s", - rb_id2name(rb_frame_callee())); - } - else { - rb_raise(rb_eSecurityError, "Insecure operation: -r"); - } + rb_insecure_operation(); } rb_secure(4); } -- cgit v1.2.3