* security(web): sanitize WhatsApp accountId to prevent path traversal Apply normalizeAccountId() from routing/session-key to resolveDefaultAuthDir() so that malicious config values like "../../../etc" cannot escape the intended auth directory. Fixes #2692 * fix(web): check sanitized segment instead of full path in Windows test * style(web): fix oxfmt formatting in accounts test
48 lines
1.5 KiB
TypeScript
48 lines
1.5 KiB
TypeScript
import path from "node:path";
|
|
import { describe, expect, it } from "vitest";
|
|
import { resolveWhatsAppAuthDir } from "./accounts.js";
|
|
|
|
describe("resolveWhatsAppAuthDir", () => {
|
|
const stubCfg = { channels: { whatsapp: { accounts: {} } } } as Parameters<
|
|
typeof resolveWhatsAppAuthDir
|
|
>[0]["cfg"];
|
|
|
|
it("sanitizes path traversal sequences in accountId", () => {
|
|
const { authDir } = resolveWhatsAppAuthDir({
|
|
cfg: stubCfg,
|
|
accountId: "../../../etc/passwd",
|
|
});
|
|
// Sanitized accountId must not escape the whatsapp auth directory.
|
|
expect(authDir).not.toContain("..");
|
|
expect(path.basename(authDir)).not.toContain("/");
|
|
});
|
|
|
|
it("sanitizes special characters in accountId", () => {
|
|
const { authDir } = resolveWhatsAppAuthDir({
|
|
cfg: stubCfg,
|
|
accountId: "foo/bar\\baz",
|
|
});
|
|
// Sprawdzaj sanityzacje na segmencie accountId, nie na calej sciezce
|
|
// (Windows uzywa backslash jako separator katalogow).
|
|
const segment = path.basename(authDir);
|
|
expect(segment).not.toContain("/");
|
|
expect(segment).not.toContain("\\");
|
|
});
|
|
|
|
it("returns default directory for empty accountId", () => {
|
|
const { authDir } = resolveWhatsAppAuthDir({
|
|
cfg: stubCfg,
|
|
accountId: "",
|
|
});
|
|
expect(authDir).toMatch(/whatsapp[/\\]default$/);
|
|
});
|
|
|
|
it("preserves valid accountId unchanged", () => {
|
|
const { authDir } = resolveWhatsAppAuthDir({
|
|
cfg: stubCfg,
|
|
accountId: "my-account-1",
|
|
});
|
|
expect(authDir).toMatch(/whatsapp[/\\]my-account-1$/);
|
|
});
|
|
});
|