logo

CVE-2011-3871 puppet

Package

Manager: gem
Name: puppet
Vulnerable Version: >=2.7.0 <2.7.5 || >=0 <2.6.11

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00042 pctl0.12066

Details

Puppet uses predictable filenames, allowing arbitrary file overwrite Puppet 2.7.x before 2.7.5, 2.6.x before 2.6.11, and 0.25.x, when running in `--edit` mode, uses a predictable file name, which allows local users to run arbitrary Puppet code or trick a user into editing arbitrary files.

Metadata

Created: 2022-05-14T00:56:55Z
Modified: 2024-01-16T21:26:49Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-mpmx-gm5v-q789/GHSA-mpmx-gm5v-q789.json
CWE IDs: ["CWE-340"]
Alternative ID: GHSA-mpmx-gm5v-q789
Finding: F034
Auto approve: 1