Research
Security News
Malicious npm Packages Inject SSH Backdoors via Typosquatted Libraries
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
blitznote.com/src/http.upload/v5
Enables you to upload files, such as build artifacts, to your HTTP server instance.
Licensed under a BSD-style license.
Version | Change |
---|---|
/v4 | Call to http.Handler is henceforth the preferred way to use this. |
/v5 | No longer limited to local filesystems as backend, the syntax for to (WriteToPath ) has changed. |
This plugin reveals some errors thrown by your filesystem implementation to the uploader, for example about insufficient space on the target device..
The way Golang currently decodes MIME Multipart (which is used with POST requests) results in any files you are uploading being held in memory for the duration of the upload.
Let this be a legible shorthand for instances of Handler
:
upload <path> {
to "<directory>"
enable_webdav
filenames_form <none|NFC|NFD>
filenames_in <u0000-uff00> [<u0000-uff00>| …]
random_suffix_len 0..N
promise_download_from <path>
max_filesize 0..N
max_transaction_size 0..N
}
These settings are required:
ServeMux
.
It will be stripped and won't be part of any resulting file and directories.file://
.It is not advised—signed upload URLs are more efficient— you can upload directly to cloud storage buckets. Use a scheme supported by the Go CDK:
import (
upload "blitznote.com/src/http.upload/v5"
_ "gocloud.dev/blob/gcsblob" // Registers scheme "gs://"
_ "gocloud.dev/blob/s3blob" // Registers scheme "s3://"
)
// …
to := "s3://my-bucket?region=us-west-1"
to = "gs://my-bucket"
to = "/var/tmp"
h, _ := upload.NewHandler("/", to, nil)
These are optional:
enable_webdav: Enables other methods than POST and PUT,
especially MOVE and DELETE. Is a flag and has no parameters.
(disable_webdav
will no longer be recognized because it's the new default.)
filenames_form: if given, filenames and directories that are not
conforming to Unicode NFC or NFD will be rejected.
Set this to one of either values when you get errors indicating that your filesystem
does not convert names properly. (If in doubt, go with NFC; on Mac PCs with NFD.)
The default is to not enforce anything.
filenames_in allows you to limit filenames to specified Unicode ranges.
The ranges' bounds must be given in hexadecimal, and start with letter u
.
Use this setting to prevent users from uploading files in, for example, Cyrillic
when expect Latin and/or Chinese alphabets only.
random_suffix_len, if > 0, will result in all filenames getting a randomized suffix.
The suffix will start in a _
(underscore letter) and placed before any extension.
For example, image.png
will be written as image_a107xm.png
with configuration value 6.
Utilize promise_download_from
to get the resulting filename.
The default is 0 for off.
promise_download_from is a string that represents an URI reference, such as a path.
It will be used to indicate where the uploaded file can be downloaded,
by responding with HTTP header Location
(multiple times if need be) for all received files.
You will most probably want to set this to the upload path
.
The default value is "", which means no HTTP header Location
will be sent.
By max_filesize you can limit the size of individual files.
Unless set to 0
, which means "unlimited" and is the default value, it's in bytes.
max_transaction_size is similar, but applies to uploads of one or more file in one request.
For example, when using MIME Multipart uploads.
The behaviour with max_filesize > max_transaction_size
is currently undefined;
set max_transaction_size to a multiple of max_filesize.
Some transfer encodings, such as base64, know comments. Those, or super-long headers and the such,
can be exploited to transfer many more bytes than for example max_transaction_size would otherwise allow.
Mitigate this by utilizing a different plugin, http.limits, which counts incoming bytes
ignorant of any encoding. Set a limit of about 1.4× to 2.05× the max_transaction_size.
This plugin writes files blockwise for a better performance. Limits are rounded up by a few kilobytes to
the next full block.
Setup a minimal configuration like this, or go run example.go &
after copying it into a separate
directory and removing the line with +build ignore
(mind the port number, which is 9000
there):
uploadHandler, _ := upload.NewHandler("/web/path", "/var/tmp", nil)
uploadHandler.EnableWebdav = true
… and upload one file:
# HTTP PUT
curl \
-T /etc/os-release \
https://127.0.0.1/web/path/from-release
… or more files in one go (sub-directories will be created as needed):
# HTTP POST
curl \
-F gitconfig=@.gitconfig \
-F id_ed25519.pub=@.ssh/id_ed25519.pub \
https://127.0.0.1/web/path/
… which you then can move and delete like this:
# MOVE is 'mv'
curl -X MOVE \
-H "Destination: /web/path/to-release" \
https://127.0.0.1/web/path/from-release
# DELETE is 'rm -r'
curl -X DELETE \
https://127.0.0.1/web/path/to-release
A host used by someone in Central and West Europe would be configured like this to accept filenames in Latin with some Greek runes and a few mathematical symbols:
h, _ := upload.NewHandler(
"/college/curriculum",
"/home/ellen_baker/inbox",
nil)
h.UnicodeForm = &struct{ Use norm.Form }{Use: norm.NFC}
h.RestrictFilenamesTo = upload.ParseUnicodeBlockList(
"u0000–u007F u0100–u017F u0391–u03C9 u2018–u203D u2152–u217F",
)
// upload /college/curriculum {
// to "/home/ellen_baker/inbox"
// filenames_form NFC
// filenames_in u0000–u007F u0100–u017F u0391–u03C9 u2018–u203D u2152–u217F
// }
A host for Linux distribution packages can be more restrictive:
h, _ := upload.NewHandler(
"/binhost/gentoo",
"/var/portage/packages",
nil)
h.RestrictFilenamesTo = upload.ParseUnicodeBlockList(
"u0000–u007F", // ASCII
)
// upload /binhost/gentoo {
// to "/var/portage/packages"
// filenames_in u0000–u007F
// }
… while someone in East Asia would share space on his blog like this:
to, _ := blob.OpenBucket(context.Background(), "gs://blog.senpai.asia")
alphabet, _ := upload.ParseUnicodeBlockList(
"u0000–u007F u0100–u017F u0391–u03C9 u2018–u203D u3000–u303f u3040–u309f u30a0–u30ff u4e00–9faf uff00–uffef"
)
h, _ := upload.Handler{
Scope: "/wp-uploads",
Bucket: to,
EnableWebdav: true,
MaxFilesize: 16<<20,
RestrictFilenamesTo: alphabet,
}
// upload /wp-uploads {
// to "/var/www/senpai/wp-uploads"
// enable_webdav
// max_filesize 16777216
// filenames_in u0000–u007F u0100–u017F u0391–u03C9 u2018–u203D u3000–u303f u3040–u309f u30a0–u30ff u4e00–9faf uff00–uffef
// }
You can find a very nice overview of Unicode Character ranges here:
http://jrgraphix.net/research/unicode_blocks.php
Here is the official list of Unicode blocks:
http://www.unicode.org/Public/UCD/latest/ucd/Blocks.txt
FAQs
Unknown package
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.