# HG changeset patch # User Sean Farley # Date 1501284996 25200 # Node ID 0bcceb58b036accce40f8144f7ddaba9dd2075f5 # Parent d7a1c4c1181de446695123515b8bc0647a1b8fe3 clone: add tests for unsafe ssh url (SEC) diff -r d7a1c4c1181d -r 0bcceb58b036 tests/test-clone.t --- a/tests/test-clone.t Tue Aug 01 14:40:19 2017 -0700 +++ b/tests/test-clone.t Fri Jul 28 16:36:36 2017 -0700 @@ -1097,3 +1097,25 @@ adding remote bookmark bookA updating working directory 1 files updated, 0 files merged, 0 files removed, 0 files unresolved + +SEC: check for unsafe ssh url + + $ hg clone 'ssh://-oProxyCommand=touch${IFS}owned/path' + abort: potentially unsafe url: 'ssh://-oProxyCommand=touch${IFS}owned/path' + [255] + $ hg clone 'ssh://%2DoProxyCommand=touch${IFS}owned/path' + abort: potentially unsafe url: 'ssh://-oProxyCommand=touch${IFS}owned/path' + [255] + $ hg clone 'ssh://fakehost|shellcommand/path' + abort: potentially unsafe url: 'ssh://fakehost|shellcommand/path' + [255] + $ hg clone 'ssh://fakehost%7Cshellcommand/path' + abort: potentially unsafe url: 'ssh://fakehost|shellcommand/path' + [255] + + $ hg clone 'ssh://-oProxyCommand=touch owned%20foo@example.com/nonexistent/path' + abort: potentially unsafe url: 'ssh://-oProxyCommand=touch owned foo@example.com/nonexistent/path' + [255] +We should not have created a file named owned - if it exists, the +attack succeeded. + $ if test -f owned; then echo 'you got owned'; fi