You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
fix: prevent path injection vulnerability in site.go
Adds comprehensive path validation to prevent path traversal attacks
in the binMetadataCache.getMetadata function. The fix includes:
- Validation against path separators (/ and \)
- Prevention of path traversal sequences (..)
- Blocking of null bytes and hidden files
- Ensuring cleaned paths match original input
Fixes CodeQL vulnerability go/path-injection at line 1048.
Co-authored-by: sreya <4856196+sreya@users.noreply.github.com>
0 commit comments