Edit in GitHubLog an issue

File uploads

When working with files, especially user-uploaded files, it is easy to make a mistake and open your store to dangerous attacks like path traversal and remote code execution (RCE). The Adobe Commerce and Magento Open Source framework provides abstraction to help you safely work with user files, but it's your responsibility to use it the right way.

When you don't need a file

There are cases when users can upload files for their own convenience. For example, consider functionality that allows a customer to upload a .csv file with a list of SKUs and quantities to add products to their cart. You don't need to store the file, you only need the contents of the file to add those SKUs to a cart. One option is to read the uploaded file, add SKUs, and delete it without ever moving it from the temporary folder on the file system. Another, even better option for security and performance, is to never upload the file in the first place. The file can be handled on the frontend side using JavaScript to extract SKUs and quantities and send those to a web API endpoint on the server.

Files inaccessible by users

Some files, generated or uploaded, need to be stored on the server for further processing or querying, but should not be directly accessible through a URL. Below are measures to avoid potential unauthorized access, path traversal, or RCE problems from such files:

  • Use random file names and extensions (it's better to use no file extensions); do not trust file names provided by users
  • Store files in a directory specifically for generated/uploaded files
  • Do not store these files in an HTTP accessible folder (like /pub)
  • Store file records in a database if the files need to be assigned to an entity
  • Do not trust user provided file names/IDs when deleting files; validate file ownership through the database

The Magento\Framework\Filesystem class can help you find the right folder to store the files. Usually, generated or inaccessible files are stored in the /var directory. See the following examples:

Copied to your clipboard
class MyClass {
private \Magento\Framework\Filesystem $filesystem;
private \Magento\Framework\Filesystem\Directory\WriteFactory $writeFactory;
private \Magento\Framework\Math\Random $rand;
public function __construct(
\Magento\Framework\Filesystem $filesystem,
\Magento\Framework\Filesystem\Directory\WriteFactory $writeFactory,
\Magento\Framework\Math\Random $rand
) {
$this->filesystem = $filesystem;
$this->writeFactory = $writeFactory;
$this->rand = $rand;
}
...
public function workWithFiles(): void {
...
//To read "MAGENTO_ROOT/var" sub-directories or files.
$varDir = $this->filesystem->getDirectoryRead(\Magento\Framework\App\Filesystem\DirectoryList::VAR_DIR);
//Going to write files into a designated folder specific to these type of files and functionality
//Getting WriteInterface instance of `MAGENTO_ROOT/var/my-modules-dir`
$thisModulesFilesDir = $this->writeFactory->create($varDir->getAbsolutePath('my-modules-dir'));
//Random file name
$randomFileName = $this->rand->getRandomString(32);
//Copying a file from the system temporary directory into it's new path
$thisModulesFilesDir->getDriver()
->copy($tmpUploadedOrGeneratedFilePath, $thisModulesFilesDir->getAbsolutePath($randomFileName));
}
}

Files that require authorization

You should treat files that require authorization to download the same way as inaccessible files; with a controller that performs authorization and then serves the file by outputting its content in response body.

Publicly accessible media files

Publicly accessible media files present higher risk and require special care because you must keep the user-provided path and file extension. You should verify the following:

  • Media files can only be placed in a publicly accessible path
  • Uploaded file path is inside the designated folder or its subdirectories
  • Extension is safe (use an allow-list)
  • File path is out of system folders that contain other application files
  • Prevent deleting system files in public folders
  • Ideally, verify user's relation to file (ownership), or containing directory before updating or deleting files

Notes:

  • The application uses the \Magento\Framework\App\Filesystem\DirectoryList::PUB directory for public files.
  • Uploaded file paths must be validated using the ReadInterface and WriteInterface instances, similar to the preceding example.
  • \Magento\Framework\Filesystem\Io\File can help extract file extensions from filenames.

Example of an imaginary class dealing with media files:

Copied to your clipboard
class MyFileUploader {
private const UPLOAD_DIR = 'my-module/customer-jpegs';
private \Magento\Framework\Filesystem\Io\File $fileUtil;
private array $allowedExt = ['jpg', 'jpeg'];
private \Magento\Framework\Filesystem\Directory\WriteFactory $writeFactory;
private \Magento\Framework\Filesystem $filesystem;
/**
* @param string $customerId UserContextInterface::getUserId() - current customer
* @param array $uploadedFileData uploaded file data from $_FILES
* @return MediaFile
* @throws \Magento\Framework\Exception\ValidatorException
*/
public function upload(string $customerId, array $uploadedFileData): MediaFile
{
//Get upload file's metadata
$info = $this->fileUtil->getPathInfo($uploadedFileData['name']);
//Validate extension is allowed
if (!in_array($info['extension'], $this->allowedExt, true)) {
throw new ValidationException('Only JPEG files allowed');
}
//Initiate WriteInterface instance of the target directory
//Target dir is a sub-dir of PUB
$uploadDir = $this->writeFactory->create(
$this->filesystem->getDirectoryRead(\Magento\Framework\App\Filesystem\DirectoryList::PUB)
->getAbsolutePath(self::UPLOAD_DIR)
);
//Get target path if uploaded to the dir
$realPath =$uploadDir->getDriver()->getRealPathSafety($uploadDir->getAbsolutePath($uploadedFileData['name']));
//Validate that the target file name is not a system file
$this->validateNotSystemFile($realPath);
//Validate that target folder (UPLOAD_DIR + ['name'] - ['basename']) is not a system folder
$this->validateNotSystemFolder(preg_replace('/\/[^\/]+$/', '', $realPath));
//Validate that given file doesn't exist or is own by current customer
$existingMediaFileInfo = $this->findFileByRelativePath($realPath);
if ($existingMediaFileInfo && $existingMediaFileInfo->getCustomerId() !== $customerId) {
throw new ValidationException('Access denied');
}
//Copy temp file to target path
$uploadDir->getDriver()->copy(
$uploadedFileData['tmp_name'],
$realPath
);
//Persist file info
$mediaFile = new MediaFile($customerId, $realPath);
return $this->persist($mediaFile);
}
}
  • Privacy
  • Terms of Use
  • Do not sell or share my personal information
  • AdChoices
Copyright © 2024 Adobe. All rights reserved.