Potential fix for code scanning alert no. 1: Arbitrary file access during archive extraction ("Zip Slip") #445
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Potential fix for https://github.com/mybatis/migrations/security/code-scanning/1
To fix the issue, we need to validate the
entry.getName()
value to ensure it does not contain directory traversal sequences (../
) or absolute paths. This can be achieved by normalizing the constructed path and verifying that it remains within the intended base directory. Specifically:java.nio.file.Path
to construct and normalize the path.The fix will be applied in the
listResources
method (or equivalent logic) whereentry.getName()
is processed.Suggested fixes powered by Copilot Autofix. Review carefully before merging.