Skip to content

Sanitize filenames in FileReceiver#805

Merged
daniestevez merged 1 commit intomainfrom
file-receiver-path
Mar 17, 2026
Merged

Sanitize filenames in FileReceiver#805
daniestevez merged 1 commit intomainfrom
file-receiver-path

Conversation

@daniestevez
Copy link
Copy Markdown
Owner

This fixes a security vulnerability in FileReceiver. Some classes which inherit from FileReceiver construct the filenames by taking a filename which is transmitted over the air. The filename was not sanitized to check that it does not contain path components such as ../. Therefore, a crafted filename could cause accesses outside of self._path.

This fixes the problem by checking that the filename has no path components, and replacing it by a UUID and logging a message if it contains path components.

This fixes #803.

This fixes a security vulnerability in FileReceiver. Some classes
which inherit from FileReceiver construct the filenames by taking
a filename which is transmitted over the air. The filename was
not sanitized to check that it does not contain path components
such as ../. Therefore, a crafted filename could cause accesses
outside of self._path.

This fixes the problem by checking that the filename has no path
components, and replacing it by a UUID and logging a message if
it contains path components.

This fixes #803.
@daniestevez daniestevez merged commit 10d27cb into main Mar 17, 2026
6 checks passed
@daniestevez daniestevez deleted the file-receiver-path branch March 17, 2026 10:40
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Path Traversal in QO-100 Multimedia File Receiver Allows Arbitrary File Write Outside Output Directory

1 participant