Issue #14093 has been updated by konrad rzentarzewski.
altough attack surface is limited to authenticated agents (usually root is required on agent, but there may be many root accounts on development boxes) remote code exploit is quite trivial and you might consider keeping it private unless people patch themselves. ---------------------------------------- Bug #14093: variable called $string in scope prevents templates from working https://projects.puppetlabs.com/issues/14093#change-86981 Author: R.I. Pienaar Status: Closed Priority: Normal Assignee: Category: templates Target version: 3.1.1 Affected Puppet version: 0.24.7 Keywords: Branch: https://github.com/puppetlabs/puppet/pull/1446 <pre> % FACTER_string="foo" puppet -e 'notice(inline_template("<%= Time.now %>"))' notice: Scope(Class[main]): foo </pre> Probably because https://github.com/puppetlabs/puppet/blob/master/lib/puppet/parser/templatewrapper.rb#L90-99 will overwrite the @string in the class tested against 2.6.x and master -- You have received this notification because you have either subscribed to it, or are involved in it. To change your notification preferences, please click here: http://projects.puppetlabs.com/my/account -- You received this message because you are subscribed to the Google Groups "Puppet Bugs" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. To post to this group, send email to [email protected]. Visit this group at http://groups.google.com/group/puppet-bugs?hl=en. For more options, visit https://groups.google.com/groups/opt_out.
