Summary
A Path Traversal vulnerability exists when using non-default configuration options UPLOAD_DIR and UPLOAD_KEEP_FILENAME=True. An attacker can write uploaded files to arbitrary locations on the filesystem by crafting a malicious filename.
Details
When UPLOAD_DIR is set and UPLOAD_KEEP_FILENAME is True, the library constructs the file path using os.path.join(file_dir, fname). Due to the behavior of os.path.join(), if the filename begins with a /, all preceding path components are discarded:
os.path.join("/upload/dir", "/etc/malicious") == "/etc/malicious"
This allows an attacker to bypass the intended upload directory and write files to arbitrary paths.
Affected Configuration
Projects are only affected if all of the following are true:
UPLOAD_DIR is set
UPLOAD_KEEP_FILENAME is set to True
- The uploaded file exceeds
MAX_MEMORY_FILE_SIZE (triggering a flush to disk)
The default configuration is not vulnerable.
Impact
Arbitrary file write to attacker-controlled paths on the filesystem.
Mitigation
Upgrade to version 0.0.22, or avoid using UPLOAD_KEEP_FILENAME=True in project configurations.
References
Summary
A Path Traversal vulnerability exists when using non-default configuration options
UPLOAD_DIRandUPLOAD_KEEP_FILENAME=True. An attacker can write uploaded files to arbitrary locations on the filesystem by crafting a malicious filename.Details
When
UPLOAD_DIRis set andUPLOAD_KEEP_FILENAMEisTrue, the library constructs the file path usingos.path.join(file_dir, fname). Due to the behavior ofos.path.join(), if the filename begins with a/, all preceding path components are discarded:This allows an attacker to bypass the intended upload directory and write files to arbitrary paths.
Affected Configuration
Projects are only affected if all of the following are true:
UPLOAD_DIRis setUPLOAD_KEEP_FILENAMEis set to TrueMAX_MEMORY_FILE_SIZE(triggering a flush to disk)The default configuration is not vulnerable.
Impact
Arbitrary file write to attacker-controlled paths on the filesystem.
Mitigation
Upgrade to version 0.0.22, or avoid using
UPLOAD_KEEP_FILENAME=Truein project configurations.References