Fix escaping issues on Windows which could lead to command injection, fixes GHSA-frqg-7g38-6gcf
parent
1a994e41d4
commit
ca5e2f8d50
|
@ -1,3 +1,7 @@
|
||||||
|
### [1.10.23] 2021-10-05
|
||||||
|
|
||||||
|
* Security: Fixed command injection vulnerability on Windows (GHSA-frqg-7g38-6gcf / CVE-2021-41116)
|
||||||
|
|
||||||
### [1.10.22] 2021-04-27
|
### [1.10.22] 2021-04-27
|
||||||
|
|
||||||
* Security: Fixed command injection vulnerability in HgDriver/HgDownloader and hardened other VCS drivers and downloaders (GHSA-h5h8-pc6h-jvvx / CVE-2021-29472)
|
* Security: Fixed command injection vulnerability in HgDriver/HgDownloader and hardened other VCS drivers and downloaders (GHSA-h5h8-pc6h-jvvx / CVE-2021-29472)
|
||||||
|
@ -938,6 +942,7 @@
|
||||||
|
|
||||||
* Initial release
|
* Initial release
|
||||||
|
|
||||||
|
[1.10.23]: https://github.com/composer/composer/compare/1.10.22...1.10.23
|
||||||
[1.10.22]: https://github.com/composer/composer/compare/1.10.21...1.10.22
|
[1.10.22]: https://github.com/composer/composer/compare/1.10.21...1.10.22
|
||||||
[1.10.21]: https://github.com/composer/composer/compare/1.10.20...1.10.21
|
[1.10.21]: https://github.com/composer/composer/compare/1.10.20...1.10.21
|
||||||
[1.10.20]: https://github.com/composer/composer/compare/1.10.19...1.10.20
|
[1.10.20]: https://github.com/composer/composer/compare/1.10.19...1.10.20
|
||||||
|
|
|
@ -129,7 +129,7 @@ EOT
|
||||||
|
|
||||||
$process = new ProcessExecutor($this->getIO());
|
$process = new ProcessExecutor($this->getIO());
|
||||||
if (Platform::isWindows()) {
|
if (Platform::isWindows()) {
|
||||||
return $process->execute('start "web" explorer "' . $url . '"', $output);
|
return $process->execute('start "web" explorer ' . $url, $output);
|
||||||
}
|
}
|
||||||
|
|
||||||
$linux = $process->execute('which xdg-open', $output);
|
$linux = $process->execute('which xdg-open', $output);
|
||||||
|
|
|
@ -155,7 +155,7 @@ class ProcessExecutor
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Copy of ProcessUtils::escapeArgument() that is deprecated in Symfony 3.3 and removed in Symfony 4.
|
* Copy of Symfony's Process::escapeArgument() which is private
|
||||||
*
|
*
|
||||||
* @param string $argument
|
* @param string $argument
|
||||||
*
|
*
|
||||||
|
@ -163,41 +163,22 @@ class ProcessExecutor
|
||||||
*/
|
*/
|
||||||
private static function escapeArgument($argument)
|
private static function escapeArgument($argument)
|
||||||
{
|
{
|
||||||
//Fix for PHP bug #43784 escapeshellarg removes % from given string
|
if ('' === $argument || null === $argument) {
|
||||||
//Fix for PHP bug #49446 escapeshellarg doesn't work on Windows
|
return '""';
|
||||||
//@see https://bugs.php.net/bug.php?id=43784
|
|
||||||
//@see https://bugs.php.net/bug.php?id=49446
|
|
||||||
if ('\\' === DIRECTORY_SEPARATOR) {
|
|
||||||
if ((string) $argument === '') {
|
|
||||||
return escapeshellarg($argument);
|
|
||||||
}
|
}
|
||||||
|
if ('\\' !== \DIRECTORY_SEPARATOR) {
|
||||||
$escapedArgument = '';
|
|
||||||
$quote = false;
|
|
||||||
foreach (preg_split('/(")/', $argument, -1, PREG_SPLIT_NO_EMPTY | PREG_SPLIT_DELIM_CAPTURE) as $part) {
|
|
||||||
if ('"' === $part) {
|
|
||||||
$escapedArgument .= '\\"';
|
|
||||||
} elseif (self::isSurroundedBy($part, '%')) {
|
|
||||||
// Avoid environment variable expansion
|
|
||||||
$escapedArgument .= '^%"'.substr($part, 1, -1).'"^%';
|
|
||||||
} else {
|
|
||||||
// escape trailing backslash
|
|
||||||
if ('\\' === substr($part, -1)) {
|
|
||||||
$part .= '\\';
|
|
||||||
}
|
|
||||||
$quote = true;
|
|
||||||
$escapedArgument .= $part;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
if ($quote) {
|
|
||||||
$escapedArgument = '"'.$escapedArgument.'"';
|
|
||||||
}
|
|
||||||
|
|
||||||
return $escapedArgument;
|
|
||||||
}
|
|
||||||
|
|
||||||
return "'".str_replace("'", "'\\''", $argument)."'";
|
return "'".str_replace("'", "'\\''", $argument)."'";
|
||||||
}
|
}
|
||||||
|
if (false !== strpos($argument, "\0")) {
|
||||||
|
$argument = str_replace("\0", '?', $argument);
|
||||||
|
}
|
||||||
|
if (!preg_match('/[\/()%!^"<>&|\s]/', $argument)) {
|
||||||
|
return $argument;
|
||||||
|
}
|
||||||
|
$argument = preg_replace('/(\\\\+)$/', '$1$1', $argument);
|
||||||
|
|
||||||
|
return '"'.str_replace(array('"', '^', '%', '!', "\n"), array('""', '"^^"', '"^%"', '"^!"', '!LF!'), $argument).'"';
|
||||||
|
}
|
||||||
|
|
||||||
private static function isSurroundedBy($arg, $char)
|
private static function isSurroundedBy($arg, $char)
|
||||||
{
|
{
|
||||||
|
|
|
@ -524,7 +524,7 @@ composer https://github.com/old/url (push)
|
||||||
|
|
||||||
public function testUpdateDoesntThrowsRuntimeExceptionIfGitCommandFailsAtFirstButIsAbleToRecover()
|
public function testUpdateDoesntThrowsRuntimeExceptionIfGitCommandFailsAtFirstButIsAbleToRecover()
|
||||||
{
|
{
|
||||||
$expectedFirstGitUpdateCommand = $this->winCompat("(git remote set-url composer -- '' && git rev-parse --quiet --verify 'ref^{commit}' || (git fetch composer && git fetch --tags composer)) && git remote set-url composer -- ''");
|
$expectedFirstGitUpdateCommand = $this->winCompat("(git remote set-url composer -- \"\" && git rev-parse --quiet --verify 'ref^{commit}' || (git fetch composer && git fetch --tags composer)) && git remote set-url composer -- \"\"");
|
||||||
$expectedSecondGitUpdateCommand = $this->winCompat("(git remote set-url composer -- 'https://github.com/composer/composer' && git rev-parse --quiet --verify 'ref^{commit}' || (git fetch composer && git fetch --tags composer)) && git remote set-url composer -- 'https://github.com/composer/composer'");
|
$expectedSecondGitUpdateCommand = $this->winCompat("(git remote set-url composer -- 'https://github.com/composer/composer' && git rev-parse --quiet --verify 'ref^{commit}' || (git fetch composer && git fetch --tags composer)) && git remote set-url composer -- 'https://github.com/composer/composer'");
|
||||||
|
|
||||||
$packageMock = $this->getMockBuilder('Composer\Package\PackageInterface')->getMock();
|
$packageMock = $this->getMockBuilder('Composer\Package\PackageInterface')->getMock();
|
||||||
|
|
|
@ -47,7 +47,7 @@ class SvnTest extends TestCase
|
||||||
return array(
|
return array(
|
||||||
array('http://till:test@svn.example.org/', $this->getCmd(" --username 'till' --password 'test' ")),
|
array('http://till:test@svn.example.org/', $this->getCmd(" --username 'till' --password 'test' ")),
|
||||||
array('http://svn.apache.org/', ''),
|
array('http://svn.apache.org/', ''),
|
||||||
array('svn://johndoe@example.org', $this->getCmd(" --username 'johndoe' --password '' ")),
|
array('svn://johndoe@example.org', $this->getCmd(" --username 'johndoe' --password \"\" ")),
|
||||||
);
|
);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue