mirror of
https://github.com/afkarxyz/SpotiFLAC.git
synced 2026-04-26 15:45:54 +03:00
[PR #214] [MERGED] Security Fix: Enforce strict validation for FFmpeg binary paths #529
Labels
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/SpotiFLAC#529
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
📋 Pull Request Information
Original PR: https://github.com/afkarxyz/SpotiFLAC/pull/214
Author: @RinZ27
Created: 1/1/2026
Status: ✅ Merged
Merged: 1/8/2026
Merged by: @afkarxyz
Base:
main← Head:fix/hardening-data-flow📝 Commits (1)
02583eeSecurity: Enforce strict validation for FFmpeg binary paths📊 Changes
3 files changed (+60 additions, -5 deletions)
View changed files
📝
backend/ffmpeg.go(+52 -5)📝
backend/filemanager.go(+4 -0)📝
backend/metadata.go(+4 -0)📄 Description
Fixes a potential command injection vulnerability by enforcing strict validation on external binary paths.
Previously,
exec.Commandaccepted paths without verification, creating an attack vector if variables were compromised. I've introduced aValidateExecutablefunction to ensure that:ffmpeg,ffprobe).This validation is now applied across
ffmpeg.go,filemanager.go, andmetadata.gobefore any subprocess execution.🔄 This issue represents a GitHub Pull Request. It cannot be merged through Gitea due to API limitations.