CVE-2012-1906 – puppet
Package
Manager: gem
Name: puppet
Vulnerable Version: >=2.6 <2.6.15 || >=2.7 <2.7.13
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:R
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00063 pctl0.19971
Details
Puppet uses predictable filenames, allowing arbitrary file overwrite Puppet 2.6.x before 2.6.15 and 2.7.x before 2.7.13, and Puppet Enterprise (PE) Users 1.0, 1.1, 1.2.x, 2.0.x, and 2.5.x before 2.5.1 uses predictable file names when installing Mac OS X packages from a remote source, which allows local users to overwrite arbitrary files or install arbitrary packages via a symlink attack on a temporary file in /tmp.
Metadata
Created: 2022-05-14T00:56:45Z
Modified: 2023-08-29T21:02:11Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-c4mc-49hq-q275/GHSA-c4mc-49hq-q275.json
CWE IDs: ["CWE-377"]
Alternative ID: GHSA-c4mc-49hq-q275
Finding: F028
Auto approve: 1