Issue #14093 has been updated by konrad rzentarzewski.

altough attack surface is limited to authenticated agents (usually root is 
required on agent, but there may be many root accounts on development boxes) 
remote code exploit is quite trivial and you might consider keeping it private 
unless people patch themselves. 
----------------------------------------
Bug #14093: variable called $string in scope prevents templates from working
https://projects.puppetlabs.com/issues/14093#change-86981

Author: R.I. Pienaar
Status: Closed
Priority: Normal
Assignee: 
Category: templates
Target version: 3.1.1
Affected Puppet version: 0.24.7
Keywords: 
Branch: https://github.com/puppetlabs/puppet/pull/1446


<pre>
% FACTER_string="foo" puppet -e 'notice(inline_template("<%= Time.now %>"))'
notice: Scope(Class[main]): foo
</pre>

Probably because 
https://github.com/puppetlabs/puppet/blob/master/lib/puppet/parser/templatewrapper.rb#L90-99
 will overwrite the @string in the class

tested against 2.6.x and master


-- 
You have received this notification because you have either subscribed to it, 
or are involved in it.
To change your notification preferences, please click here: 
http://projects.puppetlabs.com/my/account

-- 
You received this message because you are subscribed to the Google Groups 
"Puppet Bugs" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To post to this group, send email to [email protected].
Visit this group at http://groups.google.com/group/puppet-bugs?hl=en.
For more options, visit https://groups.google.com/groups/opt_out.


Reply via email to