Fix CVE-2021-27116 CVE-2021-27117

1. Adding O_NOFOLLOW flag to prevent symlink attacks

These changes help protect against various security issues including:

- Symlink attacks where attackers could trick the application into modifying unintended files
- Privilege escalation through improper file permissions

Signed-off-by: chengjingtao <jtcheng0616@gmail.com>
This commit is contained in:
chengjingtao
2025-03-11 18:57:45 +08:00
committed by Ming Deng
parent 5e9c913b47
commit 1f40a88b0c
8 changed files with 21 additions and 12 deletions

View File

@@ -17,6 +17,7 @@ package toml
import (
"os"
"strings"
"syscall"
"github.com/pelletier/go-toml"
@@ -307,7 +308,7 @@ func (c *configContainer) OnChange(key string, fn func(value string)) {
// SaveConfigFile create or override the file
func (c *configContainer) SaveConfigFile(filename string) error {
// Write configuration file by filename.
f, err := os.Create(filename)
f, err := os.OpenFile(filename, os.O_RDWR|os.O_CREATE|syscall.O_NOFOLLOW, 0600)
if err != nil {
return err
}