logo

CVE-2012-1988 puppet

Package

Manager: gem
Name: puppet
Vulnerable Version: >=2.6.0 <2.6.15 || >=2.7.0 <2.7.13

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:P/RL:U/RC:R

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00492 pctl0.64669

Details

Puppet Arbitrary Command Execution Puppet 2.6.x before 2.6.15 and 2.7.x before 2.7.13, and Puppet Enterprise (PE) Users 1.0, 1.1, 1.2.x, 2.0.x, and 2.5.x before 2.5.1 allows remote authenticated users with agent SSL keys and file-creation permissions on the puppet master to execute arbitrary commands by creating a file whose full pathname contains shell metacharacters, then performing a filebucket request.

Metadata

Created: 2022-05-14T00:56:45Z
Modified: 2024-01-12T16:30:38Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-6xxq-j39w-g3f6/GHSA-6xxq-j39w-g3f6.json
CWE IDs: ["CWE-77", "CWE-78"]
Alternative ID: GHSA-6xxq-j39w-g3f6
Finding: F004
Auto approve: 1