CVE-2011-5097
Published Aug 8, 2012
Last updated 12 years ago
Overview
- Description
- chef-server-api/app/controllers/cookbooks.rb in Chef Server in Chef before 0.9.18, and 0.10.x before 0.10.2, does not require administrative privileges for the update and destroy methods, which allows remote authenticated users to (1) upload cookbooks via a knife cookbook upload command or (2) delete cookbooks via a knife cookbook delete command.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5.5
- Impact score
- 4.9
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:N/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-264
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:opscode:chef:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "001059B9-0BBC-44B1-9B80-0252AFF77915", "versionEndIncluding": "0.9.16" }, { "criteria": "cpe:2.3:a:opscode:chef:0.7.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4303E45B-3CC7-4F86-9AA3-9DE9E340DDB7" }, { "criteria": "cpe:2.3:a:opscode:chef:0.7.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2DE318AD-5737-453F-90B9-449A3593887E" }, { "criteria": "cpe:2.3:a:opscode:chef:0.7.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D0FB009E-708B-41BE-98E3-0548204A594A" }, { "criteria": "cpe:2.3:a:opscode:chef:0.7.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C369798E-2499-4DD5-8C13-F7A3D0BCAED9" }, { "criteria": "cpe:2.3:a:opscode:chef:0.7.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E247C8C9-7404-4920-9CA8-91316483CF01" }, { "criteria": "cpe:2.3:a:opscode:chef:0.7.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0189B6A3-9D58-40D7-BB42-101A600B5014" }, { "criteria": "cpe:2.3:a:opscode:chef:0.7.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "97B55226-BC34-4060-A37D-8317B8BFB43B" }, { "criteria": "cpe:2.3:a:opscode:chef:0.8.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E624C53F-1755-4E88-B575-1AB92781A06C" }, { "criteria": "cpe:2.3:a:opscode:chef:0.8.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DAA73864-4852-47D9-9EB9-A2AD654D0BAC" }, { "criteria": "cpe:2.3:a:opscode:chef:0.8.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "112F8AEB-9DD0-4A68-B69C-B677BE373DAE" }, { "criteria": "cpe:2.3:a:opscode:chef:0.8.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9C6B61EE-2F0D-49DC-ADFD-D0A25A21B8B6" }, { "criteria": "cpe:2.3:a:opscode:chef:0.8.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B91DE695-5740-4A14-AC39-873E69E5C69B" }, { "criteria": "cpe:2.3:a:opscode:chef:0.9.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2BBC6CA8-45FE-4A3E-8EA2-D4B3B2C8036C" }, { "criteria": "cpe:2.3:a:opscode:chef:0.9.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1B0E4636-741A-488B-B630-069C31476987" }, { "criteria": "cpe:2.3:a:opscode:chef:0.9.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "870939E2-77E8-4821-851D-0B770B6BAD47" }, { "criteria": "cpe:2.3:a:opscode:chef:0.9.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A5B26A9F-3A23-4828-80B5-D8B19AEC843B" }, { "criteria": "cpe:2.3:a:opscode:chef:0.9.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "802801AB-C583-4DCB-8542-D509C6E427B7" }, { "criteria": "cpe:2.3:a:opscode:chef:0.9.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "993E5C5C-C351-4B24-ABEB-AB43C364152B" }, { "criteria": "cpe:2.3:a:opscode:chef:0.9.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "571427BE-B823-414B-9553-D1F744FE24AE" }, { "criteria": "cpe:2.3:a:opscode:chef:0.9.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B5A21EFF-2E01-4CD9-9710-328413910E58" }, { "criteria": "cpe:2.3:a:opscode:chef:0.10.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F1F1938B-B09A-456A-B831-72A1BA7A76C2" } ], "operator": "OR" } ] } ]