Skip to content

Commit

Permalink
feat: add newpage for better readability
Browse files Browse the repository at this point in the history
  • Loading branch information
bchmnn committed Aug 13, 2024
1 parent b8160b8 commit 445baaf
Show file tree
Hide file tree
Showing 2 changed files with 1 addition and 0 deletions.
Binary file modified documentation/documentation.pdf
Binary file not shown.
1 change: 1 addition & 0 deletions documentation/documentation/src/main.tex
Original file line number Diff line number Diff line change
Expand Up @@ -382,6 +382,7 @@ \subsection{How it works}
The extracted DEVENV and \robotomonoRegular{uuid} are saved in the current requests context. We can see, that \robotomonoRegular{id} is seemingly sanitized via \robotomonoRegular{util.ExtractUuid}. Instead of using the DEVENV from the context (that definitely belongs to the current user), the eventually executed controller function \robotomonoRegular{GetFileContent} uses the \robotomonoRegular{uuid} to compute the path of the requested file content.
\newpage
\lstinputlisting[caption=service/backend/controller/devenv.go\ (lines\ 239-262), style=go, label={lst:devenv-file-content-snippet}]{src/devenv-file-content-snippet.go}
Herein lies the second vulnerability. Due to the \robotomonoRegular{util.ExtractUuid} function which does not sanitize user input correctly, the adversary is able to use path traversal to retrieve the contents of files belonging to DEVENVs owned by other users.
Expand Down

0 comments on commit 445baaf

Please sign in to comment.