logo

CVE-2012-1906 puppet

Package

Manager: gem
Name: puppet
Vulnerable Version: >=2.6 <2.6.15 || >=2.7 <2.7.13

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:R

CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00063 pctl0.19971

Details

Puppet uses predictable filenames, allowing arbitrary file overwrite Puppet 2.6.x before 2.6.15 and 2.7.x before 2.7.13, and Puppet Enterprise (PE) Users 1.0, 1.1, 1.2.x, 2.0.x, and 2.5.x before 2.5.1 uses predictable file names when installing Mac OS X packages from a remote source, which allows local users to overwrite arbitrary files or install arbitrary packages via a symlink attack on a temporary file in /tmp.

Metadata

Created: 2022-05-14T00:56:45Z
Modified: 2023-08-29T21:02:11Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-c4mc-49hq-q275/GHSA-c4mc-49hq-q275.json
CWE IDs: ["CWE-377"]
Alternative ID: GHSA-c4mc-49hq-q275
Finding: F028
Auto approve: 1