commit | f471d6e8c434510d2d48738d6262e39d3c7044b9 | [log] [tgz] |
---|---|---|
author | Sergey Nikolaienkov <sergeynv@google.com> | Tue Mar 28 12:22:31 2023 +0200 |
committer | android-t1 <android-t1@t2mobile.com> | Thu Sep 14 15:59:02 2023 +0800 |
tree | 4478b761643617bd6d939d6deac7332409887a4a | |
parent | 7ed7f9ed7cf9dfbb1dbd47bccc3294d23e8146c8 [diff] |
Fix path traversal vulnerabilities in MediaProvider Canonicalize filepath provided by the caller when hanling SCAN_FILE_CALL method call in MediaProvider. Additionally, make sure to check access permission in SCAN_FILE_CALL (using enforceCallingPermissionInternal()). Preemptively canonicalize Files provided as an arguments to the public API methods in ModernMediaScanner (scanFile(), scanDirectory() and onDirectoryDirty()) to prevent path traversal attacks. Bug: 262244882 Test: atest MediaProviderTests (cherry picked from https://googleplex-android-review.googlesource.com/q/commit:5d2808f30c9dbe35ddbefeda4845328557569a93) Merged-In: I61e77d69ae857984b819fa0ea27bec5c26a34842 Change-Id: I61e77d69ae857984b819fa0ea27bec5c26a34842