Potential fix for code scanning alert no. 88: Uncontrolled data used in path expression #1368
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Potential fix for https://github.com/EsupPortail/Esup-Pod/security/code-scanning/88
To address the uncontrolled data used in path expressions, all usage of user-provided data to build file paths for access must be carefully validated and confined to an intended directory. The robust fix is to normalize the input path and verify that it is confined to a known safe root folder.
Encoding_video/Encoding_video_model, when a path such asvideo_fileis accepted, it must be resolved withos.path.normpathand ensured to reside within a trusted base directory (from the project settings or a known safe location).video_pathfrom the API to ensure prior validation or sanitization.MEDIA_ROOTor similar).os(already present), access to the Django settings (MEDIA_ROOTlikely available), fail hard if the check fails.Suggested fixes powered by Copilot Autofix. Review carefully before merging.