CVE-2012-1988
Published May 29, 2012
Last updated 9 months ago
Overview
- Description
- Puppet 2.6.x before 2.6.15 and 2.7.x before 2.7.13, and Puppet Enterprise (PE) Users 1.0, 1.1, 1.2.x, 2.0.x, and 2.5.x before 2.5.1 allows remote authenticated users with agent SSL keys and file-creation permissions on the puppet master to execute arbitrary commands by creating a file whose full pathname contains shell metacharacters, then performing a filebucket request.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6
- Impact score
- 6.4
- Exploitability score
- 6.8
- Vector string
- AV:N/AC:M/Au:S/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-78
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:puppet:puppet:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "38B82C69-873E-4529-B442-1C3C6C333124", "versionEndExcluding": "2.6.15", "versionStartIncluding": "2.6.0" }, { "criteria": "cpe:2.3:a:puppet:puppet:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DC6BE581-9580-41D0-81B0-38A7BF4B6292", "versionEndExcluding": "2.7.13", "versionStartIncluding": "2.7.0" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:puppet:puppet_enterprise:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EA364E7B-2880-4DA4-8F1F-D58176EC79FA", "versionEndExcluding": "2.5.1", "versionStartIncluding": "1.2.0" }, { "criteria": "cpe:2.3:a:puppet:puppet_enterprise:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "926CFE0B-57A0-42EE-8B84-5C53C94F552E" }, { "criteria": "cpe:2.3:a:puppet:puppet_enterprise:1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "54836761-86C0-4240-8A43-D6DECC2BBBDA" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:15:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9396E005-22D8-4342-9323-C7DEA379191D" }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "706C6399-CAD1-46E3-87A2-8DFE2CF497ED" }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2DA9D861-3EAF-42F5-B0B6-A4CD7BDD6188" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "036E8A89-7A16-411F-9D31-676313BB7244" }, { "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A9BD9DD2-B468-4732-ABB1-742D83709B54" }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EF49D26F-142E-468B-87C1-BABEA445255C" }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E4174F4F-149E-41A6-BBCC-D01114C05F38" } ], "operator": "OR" } ] } ]