CVE-2017-10689 – puppet
Package
Manager: gem
Name: puppet
Vulnerable Version: >=0 <4.10.10 || >=5.0.0 <5.3.4
Severity
Level: Medium
CVSS v3.1: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00092 pctl0.26791
Details
Tarball permission preservation in puppet When installing a module using the system tar, the PMT will filter filesystem permissions to a sane value. This may just be based on the user's umask. When using minitar, files are unpacked with whatever permissions are in the tarball. This is potentially unsafe, as tarballs can be easily created with weird permissions.
Metadata
Created: 2022-05-13T01:41:57Z
Modified: 2022-07-21T22:29:32Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-vw22-465p-8j5w/GHSA-vw22-465p-8j5w.json
CWE IDs: ["CWE-269"]
Alternative ID: GHSA-vw22-465p-8j5w
Finding: F159
Auto approve: 1