ComfyUI/tests-unit/server_test/test_view_endpoint.py
Varun Chawla dd9f4d1a32
security: refine path traversal validation to allow consecutive dots in filenames
Fixes #12352

The previous validation incorrectly rejected filenames with consecutive dots
(e.g., test..png) by checking if '..' exists anywhere in the filename.

This commit refines the validation to:
- Block actual path traversal patterns: '../', '/..'
- Block filenames starting with '..' (e.g., '..secret')
- Block absolute paths starting with '/'
- Allow consecutive dots in filenames (e.g., 'test..png', 'my...file.jpg')

Changes:
- Updated validation logic in /view and /upload/mask endpoints
- Added comprehensive test suite covering both security and functionality
- All tests pass: blocks path traversal, allows valid filenames with dots
2026-02-19 23:50:28 -08:00

115 lines
4.6 KiB
Python

"""Tests for /view endpoint path traversal validation"""
import pytest
from aiohttp import web
from aiohttp.test_utils import AioHTTPTestCase, unittest_run_loop
import os
import tempfile
from pathlib import Path
class TestViewEndpointSecurity(AioHTTPTestCase):
"""Test /view endpoint path traversal validation"""
async def get_application(self):
"""Create a minimal test application with /view endpoint"""
app = web.Application()
# Create a test directory with test files
self.test_dir = tempfile.mkdtemp()
self.test_file_valid = os.path.join(self.test_dir, "test..png")
self.test_file_normal = os.path.join(self.test_dir, "normal.png")
# Create test files
Path(self.test_file_valid).touch()
Path(self.test_file_normal).touch()
async def view_handler(request):
"""Simplified /view endpoint handler for testing"""
if "filename" not in request.rel_url.query:
return web.Response(status=404)
filename = request.rel_url.query["filename"]
if not filename:
return web.Response(status=400)
# validation for security: prevent accessing arbitrary path
# Check for path traversal patterns (../ or /..) but allow consecutive dots in filename
if filename[0] == '/' or '/..' in filename or filename.startswith('..'):
return web.Response(status=400)
# For testing, just check if file exists in test directory
filename = os.path.basename(filename)
file_path = os.path.join(self.test_dir, filename)
if os.path.isfile(file_path):
return web.Response(status=200, text="OK")
return web.Response(status=404)
app.router.add_get('/view', view_handler)
return app
async def tearDownAsync(self):
"""Clean up test files"""
import shutil
if hasattr(self, 'test_dir') and os.path.exists(self.test_dir):
shutil.rmtree(self.test_dir)
@unittest_run_loop
async def test_allows_consecutive_dots_in_filename(self):
"""Test that files with consecutive dots (e.g., test..png) are allowed"""
resp = await self.client.request("GET", "/view?filename=test..png")
assert resp.status == 200, "Should allow files with consecutive dots in filename"
@unittest_run_loop
async def test_allows_normal_filenames(self):
"""Test that normal filenames work"""
resp = await self.client.request("GET", "/view?filename=normal.png")
assert resp.status == 200, "Should allow normal filenames"
@unittest_run_loop
async def test_blocks_path_traversal_dotdot_slash(self):
"""Test that path traversal with ../ is blocked"""
resp = await self.client.request("GET", "/view?filename=../etc/passwd")
assert resp.status == 400, "Should block ../ path traversal"
@unittest_run_loop
async def test_blocks_path_traversal_slash_dotdot(self):
"""Test that path traversal with /.. is blocked"""
resp = await self.client.request("GET", "/view?filename=folder/../etc/passwd")
assert resp.status == 400, "Should block /.. path traversal"
@unittest_run_loop
async def test_blocks_absolute_paths(self):
"""Test that absolute paths starting with / are blocked"""
resp = await self.client.request("GET", "/view?filename=/etc/passwd")
assert resp.status == 400, "Should block absolute paths"
@unittest_run_loop
async def test_blocks_dotdot_at_start(self):
"""Test that filenames starting with .. are blocked"""
resp = await self.client.request("GET", "/view?filename=..secret")
assert resp.status == 400, "Should block filenames starting with .."
@unittest_run_loop
async def test_multiple_consecutive_dots(self):
"""Test that multiple consecutive dots in filename are allowed"""
# Create a file with multiple dots
test_file = os.path.join(self.test_dir, "test...png")
Path(test_file).touch()
resp = await self.client.request("GET", "/view?filename=test...png")
assert resp.status == 200, "Should allow files with multiple consecutive dots"
@unittest_run_loop
async def test_dots_in_middle_of_filename(self):
"""Test that dots in the middle of filename are allowed"""
# Create a file with dots in middle
test_file = os.path.join(self.test_dir, "my..file..name.png")
Path(test_file).touch()
resp = await self.client.request("GET", "/view?filename=my..file..name.png")
assert resp.status == 200, "Should allow dots in middle of filename"