Vulnerability Summary
HackerOne disclosed report --> https://hackerone.com/reports/3634571 by tipsen
protodump uses descriptor-controlled paths (name/go_package) in output filename construction and then enforces containment with a lexical strings.HasPrefix check after EvalSymlinks. That check is bypassable with ../ traversal into existing prefix-matching sibling directories, enabling writes outside the intended output directory.
../out_pwn/evil.proto):name = b'../out_pwn/evil.proto'
with open('/tmp/evil.bin', 'wb') as f:
f.write(bytes([0x0a, len(name)]) + name + b'\x00')
No comments yet.
Be the first to share your thoughts
Log in to join the discussion.
Sign In