Skip to content

Conversation

@jacobprezant
Copy link

Description

Fixes several path traversals that give arbitrary read/write to an attacker when handling a crafted .ipa, or in some cases a hostile iPhone. For example, during patching, a malicious .ipa could copy any file into its packed archive due to the use of CFBundleExecutable from the archive's Info.plist without proper sanitization in building paths.

Type of change

Please delete options that are not relevant.

  • Bug fix (non-breaking change which fixes an issue)

Please correct if needed.

Checklist:

  • My code follows the style guidelines of this project
  • I have performed a self-review of my own code
  • I have commented my code, particularly in hard-to-understand areas
  • I have made corresponding changes to the documentation
  • My changes generate no new warnings
  • I have added tests that prove my fix is effective or that my feature works
  • New and existing unit tests pass locally with my changes
  • Any dependent changes have been merged and published in downstream modules

@jacobprezant jacobprezant changed the title fix: path traversals fix(security): path traversals Jan 5, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant