403Webshell
Server IP : 66.29.132.122  /  Your IP : 3.138.33.120
Web Server : LiteSpeed
System : Linux business142.web-hosting.com 4.18.0-553.lve.el8.x86_64 #1 SMP Mon May 27 15:27:34 UTC 2024 x86_64
User : admazpex ( 531)
PHP Version : 7.2.34
Disable Function : NONE
MySQL : OFF  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : ON  |  Sudo : OFF  |  Pkexec : OFF
Directory :  /proc/self/root/opt/cpanel/ea-ruby27/src/passenger-release-6.0.23/test/cxx/FileTools/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ Back ]     

Current File : /proc/self/root/opt/cpanel/ea-ruby27/src/passenger-release-6.0.23/test/cxx/FileTools/PathSecurityCheckTest.cpp
#include <TestSupport.h>
#include <FileTools/FileManip.h>
#include <FileTools/PathSecurityCheck.h>
#include <unistd.h>

using namespace Passenger;
using namespace std;

namespace tut {
	struct FileTools_PathSecurityCheckTest: public TestBase {
		string tmpPath;
		TempDir tmpDir;
		vector<string> errors, checkErrors;

		FileTools_PathSecurityCheckTest()
			: tmpPath("/tmp/pathsecuritychecktest." + toString(getpid())),
			  tmpDir(tmpPath)
			{ }
	};

	DEFINE_TEST_GROUP(FileTools_PathSecurityCheckTest);

	#define ONLY_RUN_AS_ROOT() \
		do { \
			if (geteuid() != 0) { \
				return; \
			} \
		} while (false)

	TEST_METHOD(1) {
		set_test_name("It succeeds if no directory in the path is writable by a non-root user");
		ONLY_RUN_AS_ROOT();

		makeDirTree(tmpPath + "/a", "u=rwx,g=rx,o=rx");
		makeDirTree(tmpPath + "/a/b", "u=rwx,g=rx,o=rx");
		makeDirTree(tmpPath + "/a/b/c", "u=rwx,g=rx,o=rx");

		ensure("(1)", isPathProbablySecureForRootUse(tmpPath + "/a/b/c",
			errors, checkErrors));
		ensure_equals("(2)", errors.size(), 0u);
		ensure_equals("(3)", checkErrors.size(), 0u);
	}

	TEST_METHOD(2) {
		set_test_name("It fails if parts of the path is owned by a non-root user");
		ONLY_RUN_AS_ROOT();

		makeDirTree(tmpPath + "/a", "u=rwx,g=rx,o=rx");
		makeDirTree(tmpPath + "/a/b", "u=rwx,g=rx,o=rx");
		makeDirTree(tmpPath + "/a/b/c", "u=rwx,g=rx,o=rx");
		chown((tmpPath + "/a").c_str(), 1, 0);

		ensure("(1)", !isPathProbablySecureForRootUse(tmpPath + "/a/b/c",
			errors, checkErrors));
		ensure_equals("(2)", errors.size(), 1u);
		ensure_equals("(3)", checkErrors.size(), 0u);
		ensure("(4)", containsSubstring(errors[0],
			tmpPath + "/a is not secure: it can be modified by user"));
	}

	TEST_METHOD(3) {
		set_test_name("It fails if parts of the path is group-writable");
		ONLY_RUN_AS_ROOT();

		makeDirTree(tmpPath + "/a", "u=rwx,g=rx,o=rx");
		makeDirTree(tmpPath + "/a/b", "u=rwx,g=rwx,o=rx");
		makeDirTree(tmpPath + "/a/b/c", "u=rwx,g=rx,o=rx");

		ensure("(1)", !isPathProbablySecureForRootUse(tmpPath + "/a/b/c",
			errors, checkErrors));
		ensure_equals("(2)", errors.size(), 1u);
		ensure_equals("(3)", checkErrors.size(), 0u);
		ensure("(4)", containsSubstring(errors[0],
			tmpPath + "/a/b is not secure: it can be modified by group"));
	}

	TEST_METHOD(4) {
		set_test_name("It fails if parts of the path is world-writable");
		ONLY_RUN_AS_ROOT();

		makeDirTree(tmpPath + "/a", "u=rwx,g=rx,o=rx");
		makeDirTree(tmpPath + "/a/b", "u=rwx,g=rx,o=rwx");
		makeDirTree(tmpPath + "/a/b/c", "u=rwx,g=rx,o=rx");

		ensure("(1)", !isPathProbablySecureForRootUse(tmpPath + "/a/b/c",
			errors, checkErrors));
		ensure_equals("(2)", errors.size(), 1u);
		ensure_equals("(3)", checkErrors.size(), 0u);
		ensure("(4)", containsSubstring(errors[0],
			tmpPath + "/a/b is not secure: it can be modified by anybody"));
	}

	TEST_METHOD(5) {
		set_test_name("It does not fail if parts of the path is group- or world-writable as long as it's sticky");
		ONLY_RUN_AS_ROOT();

		makeDirTree(tmpPath + "/a", "u=rwx,g=rx,o=rx");
		makeDirTree(tmpPath + "/a/b", "u=rwx,g=rwx,o=rwx,+t");
		makeDirTree(tmpPath + "/a/b/c", "u=rwx,g=rx,o=rx");

		ensure("(1)", isPathProbablySecureForRootUse(tmpPath + "/a/b/c",
			errors, checkErrors));
		ensure_equals("(2)", errors.size(), 0u);
		ensure_equals("(3)", checkErrors.size(), 0u);
	}
}

Youez - 2016 - github.com/yon3zu
LinuXploit