The /media/:id endpoint was vulnerable to path traversal attacks. Since this endpoint is exposed via Tailscale Funnel (unlike the WhatsApp webhook which requires Twilio signature validation), attackers could directly request paths like /media/%2e%2e%2fwarelay.json to access sensitive files in ~/.warelay/ (e.g. warelay.json), or even escape further to the user's home directory via multiple ../ sequences. Fix: validate resolved paths stay within the media directory. 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude <noreply@anthropic.com>
63 lines
2.2 KiB
TypeScript
63 lines
2.2 KiB
TypeScript
import fs from "node:fs/promises";
|
|
import type { AddressInfo } from "node:net";
|
|
import path from "node:path";
|
|
|
|
import { afterAll, beforeAll, describe, expect, it, vi } from "vitest";
|
|
|
|
const MEDIA_DIR = path.join(process.cwd(), "tmp-media-test");
|
|
const cleanOldMedia = vi.fn().mockResolvedValue(undefined);
|
|
|
|
vi.mock("./store.js", () => ({
|
|
getMediaDir: () => MEDIA_DIR,
|
|
cleanOldMedia,
|
|
}));
|
|
|
|
const { startMediaServer } = await import("./server.js");
|
|
|
|
describe("media server", () => {
|
|
beforeAll(async () => {
|
|
await fs.rm(MEDIA_DIR, { recursive: true, force: true });
|
|
await fs.mkdir(MEDIA_DIR, { recursive: true });
|
|
});
|
|
|
|
afterAll(async () => {
|
|
await fs.rm(MEDIA_DIR, { recursive: true, force: true });
|
|
});
|
|
|
|
it("serves media and cleans up after send", async () => {
|
|
const file = path.join(MEDIA_DIR, "file1");
|
|
await fs.writeFile(file, "hello");
|
|
const server = await startMediaServer(0, 5_000);
|
|
const port = (server.address() as AddressInfo).port;
|
|
const res = await fetch(`http://localhost:${port}/media/file1`);
|
|
expect(res.status).toBe(200);
|
|
expect(await res.text()).toBe("hello");
|
|
await new Promise((r) => setTimeout(r, 600));
|
|
await expect(fs.stat(file)).rejects.toThrow();
|
|
await new Promise((r) => server.close(r));
|
|
});
|
|
|
|
it("expires old media", async () => {
|
|
const file = path.join(MEDIA_DIR, "old");
|
|
await fs.writeFile(file, "stale");
|
|
const past = Date.now() - 10_000;
|
|
await fs.utimes(file, past / 1000, past / 1000);
|
|
const server = await startMediaServer(0, 1_000);
|
|
const port = (server.address() as AddressInfo).port;
|
|
const res = await fetch(`http://localhost:${port}/media/old`);
|
|
expect(res.status).toBe(410);
|
|
await expect(fs.stat(file)).rejects.toThrow();
|
|
await new Promise((r) => server.close(r));
|
|
});
|
|
|
|
it("blocks path traversal attempts", async () => {
|
|
const server = await startMediaServer(0, 5_000);
|
|
const port = (server.address() as AddressInfo).port;
|
|
// URL-encoded "../" to bypass client-side path normalization
|
|
const res = await fetch(`http://localhost:${port}/media/%2e%2e%2fpackage.json`);
|
|
expect(res.status).toBe(400);
|
|
expect(await res.text()).toBe("invalid path");
|
|
await new Promise((r) => server.close(r));
|
|
});
|
|
});
|