SpeciesFileGroup/taxonworks

View on GitHub
app/controllers/tasks/nomenclature/paper_catalog_controller.rb

Summary

Maintainability
A
0 mins
Test Coverage

Parameter value used in file name
Open

      send_data(File.read(a), filename: "#{@taxon_name.name}_paper_catalog_#{DateTime.now}.zip", type: 'application/zip') and return

Using user input when accessing files (local or remote) will raise a warning in Brakeman.

For example

File.open("/tmp/#{cookie[:file]}")

will raise an error like

Cookie value used in file name near line 4: File.open("/tmp/#{cookie[:file]}")

This type of vulnerability can be used to access arbitrary files on a server (including /etc/passwd.

TODO found
Open

    # TODO: move logic out

There are no issues that match your filters.

Category
Status