-
Notifications
You must be signed in to change notification settings - Fork 26
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
encoded url can escape path limit #26
Comments
Thanks for opening an issue! We'll look into this. It's not immediately clear to me what is going on, so I'll need your help to understand it better. Ideally, we need to be able to reproduce the bug in the most minimal way possible. This allows us to write regression tests to verify the fix is working. If we can't reproduce it, then you'll have to test our changes for us until it's fixed -- and then we can't add test cases, either. I've attached a template below that will help make this easier and faster! This will require some effort on your part -- please understand that we will be dedicating time to fix the bug you are reporting if you can just help us understand it and reproduce it easily. This template will ask for some information you've already provided; that's OK, just fill it out the best you can. 👍 I've also included some helpful tips below the template. Feel free to let me know if you have any questions! Thank you again for your report, we look forward to resolving it! Template
Instructions -- please heed otherwise we cannot help you (help us help you!)
Example of a tutorial: Create a config file: |
1. Environment1a. Operating system and version
1b. Caddy version (run
|
Thanks, probably just need some sanitizing either here or in the upstream package. Anyone free to take this? |
Had a quick look. I think the behaviour could because the webdav handler only restricts file access to root path (C:\WWW in this case). So to get what you want i think you could do:
Not sure how feasible it is to make the webdav handler aware of the path matching and restrict? i guess this is more or less is the same issue why the prefix directive exists. Maybe there should at least be some security documentation describing it as a risky misconfiguration? |
add "..%2F" to url can get the parent of root path
The text was updated successfully, but these errors were encountered: