X-Git-Url: https://wimlib.net/git/?p=wimlib;a=blobdiff_plain;f=tests%2Fwims%2FREADME;fp=tests%2Fwims%2FREADME;h=790f5d41b179dbd3c979fb31eb209782ca93b3c8;hp=0000000000000000000000000000000000000000;hb=0e6dcdd56666fded4abf26a081bec7db37ba2cbf;hpb=e074c6d474920b8bc1436f105e0dff89e6a4bccb diff --git a/tests/wims/README b/tests/wims/README new file mode 100644 index 00000000..790f5d41 --- /dev/null +++ b/tests/wims/README @@ -0,0 +1,20 @@ +Some fun files: + +cyclic.wim: This WIM has an image with a cyclic directory structure and should be +detected as invalid. + +duplicate_names.wim: This WIM has an image with multiple files with the same +name in the same directory, and should be detected as invalid. + +dotdot.wim: This WIM has an image with the path +/../../../../../../../../../../../../../../../../etc/passwd, and should be +detected as invalid. (Fun fact: WIMGAPI is dumb and will extract .. files, and +requires running with Admin rights, so given a malicious WIM file it will +overwrite arbitrary files on the target drive.) + +longpaths.wim: This WIM has an image with a path longer than MAX_PATH on Windows. +This should still be extracted successfully. + +empty_dacl.wim: This WIM has an image containing file with a security +descriptor having an empty DACL. This is valid and should be extracted +successfully.