Skip to content

Security risk using /var/tmp as HOME #699

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Closed
sdinten opened this issue Dec 16, 2020 · 5 comments
Closed

Security risk using /var/tmp as HOME #699

sdinten opened this issue Dec 16, 2020 · 5 comments
Labels

Comments

@sdinten
Copy link
Contributor

sdinten commented Dec 16, 2020

Description

The fix for #689 is using the path /var/tmp as home folder.
This folder is writable by everybody.

This could have security impact:
Regarding https://docs.docker.com/engine/reference/commandline/cli/ :
By default, the Docker command line stores its configuration files in a directory called .docker within your $HOME directory. Docker manages most of the files in the configuration directory and you should not modify them. However, you can modify the config.json file to control certain aspects of how the docker command behaves.

So every user could invoke changing of docker settings by creating config in /var/tmp/.docker/

@sebastianTC thanks for mentioning this!

Expected Behavior

Everything works as expected but there is a security risk

Steps to Reproduce

Run puppet agent with an environment that uses the docker module

Environment

All

@sdinten sdinten added the bug label Dec 16, 2020
@sdinten
Copy link
Contributor Author

sdinten commented Dec 16, 2020

@sdinten sdinten closed this as completed Dec 16, 2020
@sdinten
Copy link
Contributor Author

sdinten commented Dec 16, 2020 via email

@sebastianTC
Copy link

sebastianTC commented Dec 16, 2020

@sdinten :

Sorry this isn't right.
The changes you see on your link, are the changes which were merged to the main branch after the release.

So yes the issue is still part of the current release.

v3.12.1...v3.13.0
This are the changes which are part of the last release.

@sdinten
Copy link
Contributor Author

sdinten commented Dec 16, 2020

@sebastianTC you're right (again). It seems that PR #698 (already merged) did not make it into the release. @adrianiurca can you put this pull request in the following update?

@sdinten sdinten reopened this Dec 16, 2020
@sdinten
Copy link
Contributor Author

sdinten commented Jul 15, 2021

Fixed as of 3.13.1 (PR #698)

@sdinten sdinten closed this as completed Jul 15, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

2 participants