From: Eric Biggers Date: Wed, 15 Jan 2014 03:36:30 +0000 (-0600) Subject: imagex-apply.1.in: Add note about directory traversal attacks X-Git-Tag: v1.6.1~38 X-Git-Url: https://wimlib.net/git/?p=wimlib;a=commitdiff_plain;h=ea914185bfdd6d2a000a341566f4dbbb7ecc2319 imagex-apply.1.in: Add note about directory traversal attacks --- diff --git a/doc/imagex-apply.1.in b/doc/imagex-apply.1.in index 46bf7ec1..1a6d0a41 100644 --- a/doc/imagex-apply.1.in +++ b/doc/imagex-apply.1.in @@ -386,6 +386,12 @@ WIMs, which usually contain LZMS-compressed solid blocks and may carry the \fI.esd\fR file extension rather than \fI.wim\fR. However, \fI.esd\fR files downloaded directly by the Windows 8 web downloader have encrypted segments, and wimlib cannot extract such files until they are first decrypted. +.PP +\fIDirectory traversal attacks\fR: wimlib validates filenames before extracting +them and is not vulnerable to directory traversal attacks. This is in contrast +to Microsoft WIMGAPI/Imagex/Dism which can override arbitrary files on the +target drive when extracting a malicious WIM file containing files named +\fI..\fR or containing path separators. .SH EXAMPLES Extract the first image from the Windows PE image on the Windows Vista/7/8 installation media to the directory "boot":