Skip to content

Commit 5be375d

Browse files
authored
fix: invalid file request not properly handled; this fixes a security vulnerability in which an invalid file request can crash the server ([GHSA-xw6g-jjvf-wwf9](GHSA-xw6g-jjvf-wwf9)) (#8060)
1 parent ed0baa8 commit 5be375d

File tree

2 files changed

+47
-3
lines changed

2 files changed

+47
-3
lines changed

spec/ParseFile.spec.js

Lines changed: 38 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -654,6 +654,44 @@ describe('Parse.File testing', () => {
654654
});
655655
});
656656

657+
describe('getting files', () => {
658+
it('does not crash on file request with invalid app ID', async () => {
659+
const res1 = await request({
660+
url: 'http://localhost:8378/1/files/invalid-id/invalid-file.txt',
661+
}).catch(e => e);
662+
expect(res1.status).toBe(403);
663+
expect(res1.data).toEqual({ code: 119, error: 'Invalid application ID.' });
664+
// Ensure server did not crash
665+
const res2 = await request({ url: 'http://localhost:8378/1/health' });
666+
expect(res2.status).toEqual(200);
667+
expect(res2.data).toEqual({ status: 'ok' });
668+
});
669+
670+
it('does not crash on file request with invalid path', async () => {
671+
const res1 = await request({
672+
url: 'http://localhost:8378/1/files/invalid-id//invalid-path/%20/invalid-file.txt',
673+
}).catch(e => e);
674+
expect(res1.status).toBe(403);
675+
expect(res1.data).toEqual({ error: 'unauthorized' });
676+
// Ensure server did not crash
677+
const res2 = await request({ url: 'http://localhost:8378/1/health' });
678+
expect(res2.status).toEqual(200);
679+
expect(res2.data).toEqual({ status: 'ok' });
680+
});
681+
682+
it('does not crash on file metadata request with invalid app ID', async () => {
683+
const res1 = await request({
684+
url: `http://localhost:8378/1/files/invalid-id/metadata/invalid-file.txt`,
685+
});
686+
expect(res1.status).toBe(200);
687+
expect(res1.data).toEqual({});
688+
// Ensure server did not crash
689+
const res2 = await request({ url: 'http://localhost:8378/1/health' });
690+
expect(res2.status).toEqual(200);
691+
expect(res2.data).toEqual({ status: 'ok' });
692+
});
693+
});
694+
657695
xdescribe('Gridstore Range tests', () => {
658696
it('supports range requests', done => {
659697
const headers = {

src/Routers/FilesRouter.js

Lines changed: 9 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -66,6 +66,12 @@ export class FilesRouter {
6666

6767
getHandler(req, res) {
6868
const config = Config.get(req.params.appId);
69+
if (!config) {
70+
res.status(403);
71+
const err = new Parse.Error(Parse.Error.OPERATION_FORBIDDEN, 'Invalid application ID.');
72+
res.json({ code: err.code, error: err.message });
73+
return;
74+
}
6975
const filesController = config.filesController;
7076
const filename = req.params.filename;
7177
const contentType = mime.getType(filename);
@@ -250,10 +256,10 @@ export class FilesRouter {
250256
}
251257

252258
async metadataHandler(req, res) {
253-
const config = Config.get(req.params.appId);
254-
const { filesController } = config;
255-
const { filename } = req.params;
256259
try {
260+
const config = Config.get(req.params.appId);
261+
const { filesController } = config;
262+
const { filename } = req.params;
257263
const data = await filesController.getMetadata(filename);
258264
res.status(200);
259265
res.json(data);

0 commit comments

Comments
 (0)