CVE-2012-3864
Published Aug 6, 2012
Last updated 5 years ago
Overview
- Description
- Puppet before 2.6.17 and 2.7.x before 2.7.18, and Puppet Enterprise before 2.5.2, allows remote authenticated users to read arbitrary files on the puppet master server by leveraging an arbitrary user's certificate and private key in a GET request.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4
- Impact score
- 2.9
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- CWE-200
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:puppet:puppet:2.6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9BEF50EE-4E4B-4641-BA34-B5024F1EF683" }, { "criteria": "cpe:2.3:a:puppet:puppet:2.6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1CC72248-FD33-4CA0-A16E-0A174A864257" }, { "criteria": "cpe:2.3:a:puppet:puppet:2.6.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7CEFB16E-261F-4B81-BCBE-536CAD2EC44B" }, { "criteria": "cpe:2.3:a:puppet:puppet:2.6.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "652D28FC-7133-4C5F-95D9-3468548465B5" }, { "criteria": "cpe:2.3:a:puppet:puppet:2.6.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AEEEE59D-BC0E-4107-B55D-9B182825E557" }, { "criteria": "cpe:2.3:a:puppet:puppet:2.6.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B4ED400E-48F7-475B-A87C-A14EC63DD93D" }, { "criteria": "cpe:2.3:a:puppet:puppet:2.6.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D827D4C2-7438-4EDD-9025-38D46CD5153C" }, { "criteria": "cpe:2.3:a:puppet:puppet:2.6.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E73C341A-6C07-4820-B1D3-4616B634F380" }, { "criteria": "cpe:2.3:a:puppet:puppet:2.6.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "61381D4C-972F-4979-84D2-793E4C60E23E" }, { "criteria": "cpe:2.3:a:puppet:puppet:2.6.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7D8C2A71-0277-4426-8627-D6FD275EFC62" }, { "criteria": "cpe:2.3:a:puppet:puppet:2.6.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3FB3C44C-2C6C-496C-9D2E-C43FFB493C42" }, { "criteria": "cpe:2.3:a:puppet:puppet:2.6.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AD2656B0-9606-477B-BEB3-35746218BF9C" }, { "criteria": "cpe:2.3:a:puppet:puppet:2.6.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "848F82FB-ACCE-42C0-A208-55522A030835" }, { "criteria": "cpe:2.3:a:puppet:puppet:2.6.13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B0BBFAA7-BB3F-49D2-975B-01194C66D7C2" }, { "criteria": "cpe:2.3:a:puppet:puppet:2.6.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "515BBBBF-7F42-490E-BF9D-B01AA3DD61C7" }, { "criteria": "cpe:2.3:a:puppet:puppet:2.6.15:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "31C87FE4-D9E8-4619-9ADB-DFC2D3FE4FB6" }, { "criteria": "cpe:2.3:a:puppet:puppet:2.7.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BE56BA6B-BDC4-431E-81FD-D7ED5E8783E9" }, { "criteria": "cpe:2.3:a:puppet:puppet:2.7.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FDDDFB28-1971-4CCD-93D2-ABC08FE67F4A" }, { "criteria": "cpe:2.3:a:puppet:puppet:2.7.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "508105B4-619A-4A9D-8B2F-FE5992C1006A" }, { "criteria": "cpe:2.3:a:puppet:puppet:2.7.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "26DB96A5-A57D-452F-A452-98B11F51CAE6" }, { "criteria": "cpe:2.3:a:puppet:puppet:2.7.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D33AF704-FA05-4EA8-BE95-0177871A810F" }, { "criteria": "cpe:2.3:a:puppet:puppet:2.7.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "390FC5AE-4939-468C-B323-6B4E267A0F4C" }, { "criteria": "cpe:2.3:a:puppet:puppet:2.7.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "07DE4213-E233-402E-88C2-B7FF8D7B682C" }, { "criteria": "cpe:2.3:a:puppet:puppet:2.7.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4122D8E3-24AD-4A55-9F89-C3AAD50E638D" }, { "criteria": "cpe:2.3:a:puppet:puppet:2.7.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AF6D6B90-62BA-4944-A699-6D7C48AFD0A1" }, { "criteria": "cpe:2.3:a:puppet:puppet:2.7.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8EC6A7B3-5949-4439-994A-68DA65438F5D" }, { "criteria": "cpe:2.3:a:puppet:puppet:2.7.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5140C34D-589C-43DB-BCA7-8434EB173205" }, { "criteria": "cpe:2.3:a:puppet:puppet:2.7.13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E561C081-6262-46D3-AB17-01EEA6D3E988" }, { "criteria": "cpe:2.3:a:puppet:puppet:2.7.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4703802D-0E3A-4760-B660-6AE0AF74DD40" }, { "criteria": "cpe:2.3:a:puppet:puppet:2.7.16:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BE3D39F6-F9C8-4E7F-981A-265B04E85579" }, { "criteria": "cpe:2.3:a:puppet:puppet:2.7.17:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FEBB3936-7A81-4BD9-80B2-3F614980BBCE" }, { "criteria": "cpe:2.3:a:puppetlabs:puppet:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BE6F41EF-556F-42E0-B26C-B96CD9C77B2B", "versionEndIncluding": "2.6.16" }, { "criteria": "cpe:2.3:a:puppetlabs:puppet:2.7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1E5192CB-094F-469E-A644-2255C4F44804" }, { "criteria": "cpe:2.3:a:puppetlabs:puppet:2.7.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D17D2752-CB0D-4CC8-8604-FEBF8DEE16E0" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:puppet:puppet_enterprise:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F66C1E54-FBEA-4008-BC88-A390D415F3F5", "versionEndIncluding": "2.5.1" } ], "operator": "OR" } ] } ]