mirror of
https://github.com/github/codeql.git
synced 2026-04-25 08:45:14 +02:00
Suggested changes
Co-authored-by: Geoffrey White <40627776+geoffw0@users.noreply.github.com>
This commit is contained in:
@@ -31,7 +31,7 @@ The following examples unpacks a remote zip using `fileManager.unzipItem()` whic
|
||||
|
||||
|
||||
<p>Consider using a safer module, such as: <code>ZIPArchive</code></p>
|
||||
<sample src="ZIPArchiveGood.swift" />
|
||||
<sample src="ZipArchiveGood.swift" />
|
||||
</example>
|
||||
|
||||
<references>
|
||||
|
||||
@@ -1,11 +1,11 @@
|
||||
/**
|
||||
* @name Arbitrary file write during a zip extraction from a user controlled source
|
||||
* @description Unpacking user controlled zips without validating if destination path file
|
||||
* is within the destination directory can cause files outside
|
||||
* the destination directory to be overwritten.
|
||||
* @description Unpacking user controlled zips without validating whether the
|
||||
* destination file path is within the destination directory can cause files
|
||||
* outside the destination directory to be overwritten.
|
||||
* @kind path-problem
|
||||
* @problem.severity error
|
||||
* @security-severity 9.8
|
||||
* @security-severity 7.5
|
||||
* @precision high
|
||||
* @id swift/unsafe-unpacking
|
||||
* @tags security
|
||||
|
||||
Reference in New Issue
Block a user