According to the Java API [[API 2006]], class java.io.File
A path name, whether abstract or in string form, may be either absolute or relative. An absolute path name is complete in that no other information is required to locate the file that it denotes. A relative path name, in contrast, must be interpreted in terms of information taken from some other path name.
Absolute or relative path names may contain file links such as symbolic (soft) links, hard links, short cuts, shadows, aliases, and junctions rather than canonical paths. These aliases must be fully resolved before any file validation operations are performed. For example, the final target of a symbolic link called trace
might be the path name /home/system/trace
. Path names may also contain special file names that make validation difficult:
- â.â refers to the directory itself.
- Inside a directory, the special file name â..â refers to the directoryâs parent directory.
In addition to these specific issues, there are a wide variety of operating and file system specific naming conventions which make validation difficult.
The process of canonicalizing file names makes it easier to validate an path name. More than one path name can refer to a single directory or file. Further, the textual representation of an path name may yield little or no information regarding the directory or file to which it refers. Consequently, all path names must be fully resolved or canonicalized before validation.
This is necessary because operating on untrusted user input may result in a directory traversal or path equivalence vulnerability. A directory traversal vulnerability allows an I/O operation to escape a specified operating directory. A path equivalence vulnerabilities occur when an attacker provides a different but equivalent name for a resource to bypass security checks.
Canonicalization contains an inherent race condition between the time you
- create the canonical path name
- perform the validation
- open the file
During this time the canonical path name may have been modified and may no longer be referencing a valid file. The canonical path name can be used to determine if the referenced file name is in a secure directory (see FIO00-J. Do not operate on files in shared directories). If the referenced file is in a secure directory, then by definition, an attacker cannot tamper with it, and cannot exploit the race condition.
This rule is a specific instance of IDS01-J. Normalize strings before validating them.
Noncompliant Code Example
This noncompliant code example accepts a file path as a command line argument and uses the File.getAbsolutePath()
method to obtain the absolute file path. It also uses the isInSecureDir()
method defined in FIO00-J. Do not operate on files in shared directories to ensure that the file is in a secure directory. But it does not resolve file links or eliminate equivalence errors.
public static void main(String[] args) { File f = new File("/home/me/" + args[0]); String absPath = f.getAbsolutePath(); if (!isInSecureDir(Paths.get( absPath))) { throw new IllegalArgumentException(); } if (!validate(absPath)) { // Validation throw new IllegalArgumentException(); } }
The application intends to restrict the user from operating on files outside the /home/me
directory and uses a validate()
method to enforce this condition. The path name validation can be easily circumvented. For example, if the directory were not seucre, an attacker who can create symbolic links in /home/me
can cause the program to pass validation checks by supplying the unresolved path. All file operations performed are reflected in the file pointed to by the symbolic link. If the string filename
is passed as argv[0]
and /home/me/filename
is a symbolic link that refers to /dirname/filename
the validation passes. This is because the root directory of the compiled path name is still /home/me
, but the operations are carried out on the file /dirname/filename
.
Note that File.getAbsolutePath()
does resolve symbolic links, aliases, and short cuts on Windows and Macintosh platforms. Nevertheless, the JLS lacks any guarantee that this behavior is present on all platforms or that it will continue in future implementations.
Compliant Solution (getCanonicalPath()
)
This compliant solution uses the getCanonicalPath()
method, introduced in Java 2, because it resolves all aliases, shortcuts, or symbolic links consistently across all platforms. Special file names such as dot dot (..
) are also removed so that the input is reduced to a canonicalized form before validation is carried out. An attacker cannot use ../
sequences to break out of the specified directory when the validate()
method is present.
public static void main(String[] args) throws IOException { File f = new File("/home/me/" + args[0]); String canonicalPath = f.getCanonicalPath(); if (!isInSecureDir(Paths.get(canonicalPath))) { throw new IllegalArgumentException(); } if (!validate(canonicalPath)) { // Validation throw new IllegalArgumentException(); } }
The getCanonicalPath()
method throws a security exception when used within applets as it reveals too much information about the host machine. The getCanonicalFile()
method behaves like getCanonicalPath()
but returns a new File
object instead of a String
.
Compliant Solution (Security Manager)
A comprehensive way of handling this issue is to grant the application the permissions to operate only on files present within the intended directory — /home/me
in this example. This compliant solution specifies the absolute path of the program in its security policy file, and grants java.io.FilePermission
with target /home/me
and actions read
and write
.
grant codeBase "file:/home/programpath/" { permission java.io.FilePermission "/home/me", "read, write"; };
This solution does require that /home/me
must be a secure directory, and associated code should check this requirement and abort if it is not met.
Noncompliant Code Example
This noncompliant code example allows the user to specify the absolute path of a file name on which to operate. The user can specify files outside the intended directory (/img
in this example) by entering an argument that contains ../
sequences, and consequently violate the intended security policies of the program.
FileOutputStream fis = new FileOutputStream(new File("/img/" + args[0])); // ...
Noncompliant Code Example
The following code examples assume that /img
and /img/java
are secure directories.
This noncompliant code example attempts to mitigate the issue by using the File.getCanonicalPath()
method, which fully resolves the argument and constructs a canonicalized path. For example, the path /img/../etc/passwd
resolves to /etc/passwd
. Validation without canonicalization remains insecure because the user can specify files outside the intended directory.
File f = new File("/img/" + args[0]); String canonicalPath = f.getCanonicalPath(); FileOutputStream fis = new FileOutputStream(f); // ...
Compliant Solution
This compliant solution obtains the file name from the untrusted user input, canonicalizes it and then validates it against the intended file name. It operates on the specified file only when validation succeeds.
File f = new File("/img/" + args[0]); String canonicalPath = f.getCanonicalPath(); if (canonicalPath.equals("/img/java/file1.txt")) { // Validation // Do something } if (!canonicalPath.equals("/img/java/file2.txt")) { // Validation // Do something } FileOutputStream fis = new FileOutputStream(f);
Compliant solution (Security Manager)
A comprehensive solution is to grant the application the permissions to read only the specifically intended files or directories. Grant these permissions by to specifying the absolute path of the program in the security policy file and granting java.io.FilePermission
with the canonicalized absolute path of the file or directory as the target name and with the action set to read
.
// All files in /img/java can be read grant codeBase "file:/home/programpath/" { permission java.io.FilePermission "/img/java", "read"; };
Risk Assessment
Using path names from untrusted sources without first canonicalizing them and then validating them can result in directory traversal and path equivalence vulnerabilities.
Recommendation |
Severity |
Likelihood |
Remediation Cost |
Priority |
Level |
---|---|---|---|---|---|
IDS02-J |
medium |
unlikely |
medium |
P4 |
L3 |
Related Vulnerabilities
Related Guidelines
FIO02-C. Canonicalize path names originating from untrusted sources |
||||
FIO02-CPP. Canonicalize path names originating from untrusted sources |
||||
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="b5a43c88-ef8e-4346-ae4d-0386ceb96f99"><ac:plain-text-body><![CDATA[ |
[[MITRE 2009 |
AA. Bibliography#MITRE 09]] |
[CWE ID 171 |
http://cwe.mitre.org/data/definitions/171.html] "Cleansing, Canonicalization, and Comparison Errors"]]></ac:plain-text-body></ac:structured-macro> |
|
CWE ID 647 "Use of Non-Canonical URL Paths for Authorization Decisions" |
Bibliography
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="bfc0f6f2-edb1-44f6-b871-caded84491e2"><ac:plain-text-body><![CDATA[ |
[[API 2006 |
AA. Bibliography#API 06]] |
[method getCanonicalPath() |
http://java.sun.com/javase/6/docs/api/java/io/File.html#getCanonicalPath()] |
]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="a82f3f59-8f51-4f80-b451-4cab19179b32"><ac:plain-text-body><![CDATA[ |
[[Harold 1999 |
AA. Bibliography#Harold 99]] |
|
]]></ac:plain-text-body></ac:structured-macro> |
IDS03-J. Validate all data passed in through environment variables and non-default properties