CVE-2012-1989
Published Jun 27, 2012
Last updated 5 years ago
Overview
- Description
- telnet.rb in Puppet 2.7.x before 2.7.13 and Puppet Enterprise (PE) 1.2.x, 2.0.x, and 2.5.x before 2.5.1 allows local users to overwrite arbitrary files via a symlink attack on the NET::Telnet connection log (/tmp/out.log).
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 3.6
- Impact score
- 4.9
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:N/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-264
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:puppet:puppet:2.7.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FDDDFB28-1971-4CCD-93D2-ABC08FE67F4A" }, { "criteria": "cpe:2.3:a:puppet:puppet:2.7.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "508105B4-619A-4A9D-8B2F-FE5992C1006A" }, { "criteria": "cpe:2.3:a:puppet:puppet:2.7.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "26DB96A5-A57D-452F-A452-98B11F51CAE6" }, { "criteria": "cpe:2.3:a:puppet:puppet:2.7.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D33AF704-FA05-4EA8-BE95-0177871A810F" }, { "criteria": "cpe:2.3:a:puppet:puppet:2.7.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "07DE4213-E233-402E-88C2-B7FF8D7B682C" }, { "criteria": "cpe:2.3:a:puppet:puppet:2.7.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4122D8E3-24AD-4A55-9F89-C3AAD50E638D" }, { "criteria": "cpe:2.3:a:puppet:puppet:2.7.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AF6D6B90-62BA-4944-A699-6D7C48AFD0A1" }, { "criteria": "cpe:2.3:a:puppet:puppet:2.7.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8EC6A7B3-5949-4439-994A-68DA65438F5D" }, { "criteria": "cpe:2.3:a:puppet:puppet:2.7.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5140C34D-589C-43DB-BCA7-8434EB173205" }, { "criteria": "cpe:2.3:a:puppetlabs:puppet:2.7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1E5192CB-094F-469E-A644-2255C4F44804" }, { "criteria": "cpe:2.3:a:puppetlabs:puppet:2.7.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D17D2752-CB0D-4CC8-8604-FEBF8DEE16E0" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:puppet:puppet_enterprise:1.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0A584D14-197E-47EB-B394-B8B211D4B502" }, { "criteria": "cpe:2.3:a:puppet:puppet_enterprise:1.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BFF8F62F-8782-4FD2-BC14-3F9E46881F0C" }, { "criteria": "cpe:2.3:a:puppet:puppet_enterprise:1.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "36A3FDB9-F599-4999-A6B9-C82C7DAF5A70" }, { "criteria": "cpe:2.3:a:puppet:puppet_enterprise:1.2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "41C07E3C-4F96-4B91-8B2D-09076749FF2B" }, { "criteria": "cpe:2.3:a:puppet:puppet_enterprise:1.2.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "76BD798A-9D06-4CC2-B40B-D377EBEBA5B9" }, { "criteria": "cpe:2.3:a:puppet:puppet_enterprise:2.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CCFA5742-38F2-43BD-9C90-E4F447F55684" }, { "criteria": "cpe:2.3:a:puppet:puppet_enterprise:2.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1389B834-FE5B-4CF7-93CC-63E919FC58CE" }, { "criteria": "cpe:2.3:a:puppet:puppet_enterprise:2.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D8A8C568-1922-4701-BA61-DF960C43A6FD" }, { "criteria": "cpe:2.3:a:puppet:puppet_enterprise:2.5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0DB5A3CC-05AA-4192-9527-7B55FC1121F7" } ], "operator": "OR" } ] } ]