Fix CVE-2021-27116 CVE-2021-27117

1. Adding O_NOFOLLOW flag to prevent symlink attacks

These changes help protect against various security issues including:

- Symlink attacks where attackers could trick the application into modifying unintended files
- Privilege escalation through improper file permissions

Signed-off-by: chengjingtao <jtcheng0616@gmail.com>
This commit is contained in:
chengjingtao
2025-03-11 18:57:45 +08:00
committed by Ming Deng
parent 5e9c913b47
commit 1f40a88b0c
8 changed files with 21 additions and 12 deletions

View File

@@ -36,6 +36,7 @@ import (
"strconv"
"strings"
"sync"
"syscall"
"github.com/mitchellh/mapstructure"
@@ -247,7 +248,7 @@ func (c *ConfigContainer) GetSection(section string) (map[string]string, error)
// SaveConfigFile save the config into file
func (c *ConfigContainer) SaveConfigFile(filename string) (err error) {
// Write configuration file by filename.
f, err := os.Create(filename)
f, err := os.OpenFile(filename, os.O_RDWR|os.O_CREATE|syscall.O_NOFOLLOW, 0600)
if err != nil {
return err
}