-
Notifications
You must be signed in to change notification settings - Fork 2.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Avoid the use of mojo_base.mojom.FilePath
#41834
Comments
The use of `base::FilePath` in `TorConfig` could be a serious source for a vulnerability if someone got control of the browser process. This change employs the use of `SafeBaseName`, which only allows for the base component of a path. With this browser process and the tor launcher do agree over a certain definition of how the files are discovered. Additionally, this change removes the setting of executable bit when extracting the tor binary, as this has been correct upstream since[1]. [1] https://crrev.com/c/3379289 Resolves brave/brave-browser#41834
The use of `base::FilePath` in `TorConfig` could be a serious source for a vulnerability if someone got control of the browser process. This change employs the use of `SafeBaseName`, which only allows for the base component of a path. With this browser process and the tor launcher do agree over a certain definition of how the files are discovered. Additionally, this change removes the setting of executable bit when extracting the tor binary, as this has been correct upstream since[1]. [1] https://crrev.com/c/3379289 Resolves brave/brave-browser#41834
The use of `base::FilePath` in `TorConfig` could be a serious source for a vulnerability if someone got control of the browser process. This change employs the use of `SafeBaseName`, which only allows for the base component of a path. With this browser process and the tor launcher do agree over a certain definition of how the files are discovered. Additionally, this change removes the setting of executable bit when extracting the tor binary, as this has been correct upstream since[1]. [1] https://crrev.com/c/3379289 Resolves brave/brave-browser#41834
The use of `base::FilePath` in `TorConfig` could be a serious source for a vulnerability if someone got control of the browser process. This change employs the use of `SafeBaseName`, which only allows for the base component of a path. With this browser process and the tor launcher do agree over a certain definition of how the files are discovered. Additionally, this change removes the setting of executable bit when extracting the tor binary, as this has been correct upstream since[1]. [1] https://crrev.com/c/3379289 Resolves brave/brave-browser#41834
The use of `base::FilePath` in `TorConfig` could be a serious source for a vulnerability if someone got control of the browser process. This change employs the use of `SafeBaseName`, which only allows for the base component of a path. With this browser process and the tor launcher do agree over a certain definition of how the files are discovered. Additionally, this change removes the setting of executable bit when extracting the tor binary, as this has been correct upstream since[1]. [1] https://crrev.com/c/3379289 Resolves brave/brave-browser#41834
The use of `base::FilePath` in `TorConfig` could be a serious source for a vulnerability if someone got control of the browser process. This change employs the use of `SafeBaseName`, which only allows for the base component of a path. With this browser process and the tor launcher do agree over a certain definition of how the files are discovered. Resolves brave/brave-browser#41834
The use of `base::FilePath` in `TorConfig` could be a serious source for a vulnerability if someone got control of the browser process. This change employs the use of `SafeBaseName`, which only allows for the base component of a path. With this browser process and the tor launcher do agree over a certain definition of how the files are discovered. Resolves brave/brave-browser#41834
The use of `base::FilePath` in `TorConfig` could be a serious source for a vulnerability if someone got control of the browser process. This change employs the use of `SafeBaseName`, which only allows for the base component of a path. With this browser process and the tor launcher do agree over a certain definition of how the files are discovered. Resolves brave/brave-browser#41834
The use of `base::FilePath` in `TorConfig` could be a serious source for a vulnerability if someone got control of the browser process. This change employs the use of `SafeBaseName`, which only allows for the base component of a path. With this browser process and the tor launcher do agree over a certain definition of how the files are discovered. Resolves brave/brave-browser#41834
The use of `base::FilePath` in `TorConfig` could be a serious source for a vulnerability if someone got control of the browser process. This change employs the use of `SafeBaseName`, which only allows for the base component of a path. With this browser process and the tor launcher do agree over a certain definition of how the files are discovered. Resolves brave/brave-browser#41834
@cdesouza-chromium since this one is In the mean time, adding |
@LaurenWags The test is mainly to open a Private Window with Tor, and check that tor navigation, and features are working in general. |
Thanks @cdesouza-chromium. We do a general regression test of Tor during our manual passes for all 3 desktop OSes, so we can just do a quick check here to make sure nothing obvious is broken 👍🏻 |
Verification
|
Description
We should remove the use of
mojo_base.mojom.FilePath
from the codebase, as it allows for relative paths parent paths, which can be a source of vulnerability if the browser process is compromised.The text was updated successfully, but these errors were encountered: