[Add] Closed some vulns allowing Lua to escape sandbox.
This commit is contained in:
parent
b4855fa47e
commit
b5c6b523a3
@ -11,6 +11,20 @@
|
||||
LuaProcessor::LuaProcessor(Session& context) {
|
||||
_lua.open_libraries(sol::lib::base, sol::lib::string, sol::lib::table);
|
||||
|
||||
/* Remove some dangerous functions from the base lib. */
|
||||
_lua["dofile"] = sol::nil;
|
||||
_lua["loadfile"] = sol::nil;
|
||||
_lua["load"] = sol::nil;
|
||||
_lua["pcall"] = sol::nil;
|
||||
_lua["xpcall"] = sol::nil;
|
||||
_lua["collectgarbage"] = sol::nil;
|
||||
_lua["getmetatable"] = sol::nil;
|
||||
_lua["setmetatable"] = sol::nil;
|
||||
_lua["rawequal"] = sol::nil;
|
||||
_lua["rawget"] = sol::nil;
|
||||
_lua["rawset"] = sol::nil;
|
||||
_lua["rawlen"] = sol::nil;
|
||||
|
||||
/* Expose vfs_node struct members to Lua. */
|
||||
_lua.new_usertype<vfs_node>("vfs_node",
|
||||
"name", &vfs_node::name,
|
||||
|
||||
Loading…
Reference in New Issue
Block a user