Hide Forgot
Description of problem: The handling of keys needs to do some path sanitizing so that it _only_ creates files in the directory used to hold the keys and that it only reads files in this keys directory as well. Right now, you can include things like "../../../etc/whatever" as the key and you can get the agent to either: 1) return the contents of any file on the system using the is_configured method 2) write over any file on the system if you use run_uri or run_string I don't consider this a security problem or anything given that this is an agent that has full access to run puppet and update the system anyway, but the key handling really should be more sandboxed than it is.
I made some suggestions here: https://fedorahosted.org/pipermail/matahari/2011-July/001485.html
http://git.io/i82Whg
good 2 go in v0.4.4-6 qmf: call 1 is_configured /etc/passwd Output Parameters: Name Value ================= status unknown qmf: call 1 run_uri http://127.0.0.1/sysconfig-test 1 puppet /etc/passwd /usr/bin/qmf-tool:139: DeprecationWarning: BaseException.message has been deprecated as of Python 2.6 if e.message.__class__ == qmf2.Data: Exception in call command: From Remote Agent: {'error_text': 'Invalid Arguments'}
Technical note added. If any revisions are required, please edit the "Technical Notes" field accordingly. All revisions will be proofread by the Engineering Content Services team. New Contents: No description required.
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. http://rhn.redhat.com/errata/RHBA-2011-1569.html