Skip to content

Fix path traversal vulnerability in downloader#14

Merged
zouxianyu merged 1 commit into
masterfrom
fix/path-traversal-vulnerability
Mar 30, 2026
Merged

Fix path traversal vulnerability in downloader#14
zouxianyu merged 1 commit into
masterfrom
fix/path-traversal-vulnerability

Conversation

@zouxianyu
Copy link
Copy Markdown
Owner

Add input validation for file name and GUID parameters to prevent directory traversal attacks. The validation ensures:

  • File names only contain alphanumeric characters, dots, underscores, and hyphens
  • GUIDs only contain hexadecimal characters
  • Both parameters are non-empty

This prevents malicious inputs from accessing files outside the intended directory structure.

Add input validation for file name and GUID parameters to prevent
directory traversal attacks. The validation ensures:
- File names only contain alphanumeric characters, dots, underscores, and hyphens
- GUIDs only contain hexadecimal characters
- Both parameters are non-empty

This prevents malicious inputs from accessing files outside the intended
directory structure.

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
@zouxianyu zouxianyu merged commit bba6903 into master Mar 30, 2026
5 checks passed
@zouxianyu zouxianyu deleted the fix/path-traversal-vulnerability branch March 30, 2026 13:54
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant