| liam.sexton I don't believe the left behind files are a security concern because when puppet and pxp-agent services run, we explicitly manage their PATH environment variables to only include the new directory locations and trusted directories: puppet The puppet service hard codes the PATH as:
C:\Program Files\Puppet Labs\Puppet\puppet\bin;C:\Program Files\Puppet Labs\Puppet\bin;%PATH%
|
pxp-agent The pxp-agent service PATH is specified in the registry under HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\pxp-agent\Parameters
PATH=C:\Program Files\Puppet Labs\Puppet\puppet\bin;%PATH%
|
So in theory there should only be an issue if one of the directories in the PATH included vulnerable components left over after the upgrade. Since these directories:
"C:\program files\puppet labs\puppet\pxp-agent\bin" |
"C:\Program Files\Puppet Labs\Puppet\sys\ruby\bin"
|
are not in the PATH used by either services, it should not be a problem. That said I'd recommend cleaning those up, either through a custom module or as a feature request to the puppet_agent module. |