The Puppet Labs Issue Tracker has Moved: https://tickets.puppetlabs.com
The use of FileUtils.rm_rf should be made secure
|Assignee:||Kelsey Hightower||% Done:|
|Affected Puppet version:||2.7.12||Branch:||https://github.com/puppetlabs/puppet/pull/629|
Ticket tracking is now hosted in JIRA: https://tickets.puppetlabs.com
This issue is currently not available for export. If you are experiencing the issue described below, please file a new ticket in JIRA. Once a new ticket has been created, please add a link to it that points back to this Redmine ticket.
All uses of the
FileUtils.rm_rf method should be made secure by setting the
:secure option to true.
From the online docs:
This method causes local vulnerability if one of parent directories or removing directory tree are world writable (including /tmp, whose permission is 1777), and the current process has strong privilege such as Unix super user (root), and the system has symbolic link. For secure removing, read the documentation of remove_entry_secure carefully, and set :secure option to true. Default is :secure=>false.
NOTE: This method calls remove_entry_secure if :secure option is set.