Potential fix for code scanning alert no. 29: Code injection #3340
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Potential fix for https://github.com/chef/supermarket/security/code-scanning/29
The root problem is allowing user-controlled input to be dynamically constantized into a class name using
constantize
, which can lead to code injection. Instead, the solution is to create a static mapping of the permitted resource types ("Cookbook"
and"Tool"
) to their respective classes. We replacewith a safe mapping, e.g.:
This eliminates dynamic constantization. Also, ensure this mapping is defined in the same class or as a private constant.
The only file to modify is
src/supermarket/app/controllers/collaborators_controller.rb
, in thecreate
action (lines 34-52).Suggested fixes powered by Copilot Autofix. Review carefully before merging.