Skip to content

Conversation

@0xalpharush
Copy link
Contributor

@0xalpharush 0xalpharush commented May 8, 2023

If a user ran crytic-compile on an address with malicious artifacts verified on etherscan, it was possible to write files on the user's machine by using a relative path e.g. ../../../../.env to traverse above the export directory (crytic-export/ ). This fix prevents path traversal by ensuring the absolute path of all files written to disk have a common prefix with the export directory.

Thank you Lucas Ma (https://twitter.com/MaLucasBC) for responsibly disclosing this vulnerability.

@0xalpharush 0xalpharush requested a review from elopez May 8, 2023 14:27
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants