Anonymous Intelligence Signal

Linux Profile Tool Vulnerability: `setup_delete` Allows Arbitrary File Deletion Without Confirmation

human The Lab unverified 2026-04-15 18:23:07 Source: GitHub Issues

A critical vulnerability in the Linux Profile tool allows an attacker to delete arbitrary files on the filesystem without any confirmation or safety checks. The flaw resides in the `Profile.setup_delete` method, which calls `.unlink()` on a user-supplied path. This method performs no secondary verification to ensure the target path is within the intended profiles directory, and it executes the deletion silently, offering no undo option.

The vulnerability is compounded by a separate path traversal issue in the `validator_delete` function (referenced in issue #209). When chained together, these weaknesses enable an attacker to specify a path that escapes the controlled directory, leading to the potential destruction of critical system files. The vulnerable code is isolated to lines 40–41 in `linux_profile/commands/profile.py`, where the `self.fields.delete.unlink()` command is executed immediately within the `setup_delete` function. The broader `setup` method shows no guard rails or containment checks before this destructive call is made.

This represents a severe local privilege escalation and data integrity risk. Any user or process with permission to run the profile tool could irreversibly delete files anywhere the application has write access. The lack of confirmation prompts or logging for the delete operation heightens the risk of both malicious exploitation and catastrophic accidental data loss. System administrators and developers using this tool must apply patches immediately to prevent unauthorized file system manipulation.