CVE-2012-3866
Published Aug 6, 2012
Last updated 5 years ago
Overview
- Description
- lib/puppet/defaults.rb in Puppet 2.7.x before 2.7.18, and Puppet Enterprise before 2.5.2, uses 0644 permissions for last_run_report.yaml, which allows local users to obtain sensitive configuration information by leveraging access to the puppet master server to read this file.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 2.1
- Impact score
- 2.9
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- CWE-264
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:puppet:puppet:2.7.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BE56BA6B-BDC4-431E-81FD-D7ED5E8783E9" }, { "criteria": "cpe:2.3:a:puppet:puppet:2.7.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FDDDFB28-1971-4CCD-93D2-ABC08FE67F4A" }, { "criteria": "cpe:2.3:a:puppet:puppet:2.7.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "508105B4-619A-4A9D-8B2F-FE5992C1006A" }, { "criteria": "cpe:2.3:a:puppet:puppet:2.7.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "26DB96A5-A57D-452F-A452-98B11F51CAE6" }, { "criteria": "cpe:2.3:a:puppet:puppet:2.7.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D33AF704-FA05-4EA8-BE95-0177871A810F" }, { "criteria": "cpe:2.3:a:puppet:puppet:2.7.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "07DE4213-E233-402E-88C2-B7FF8D7B682C" }, { "criteria": "cpe:2.3:a:puppet:puppet:2.7.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4122D8E3-24AD-4A55-9F89-C3AAD50E638D" }, { "criteria": "cpe:2.3:a:puppet:puppet:2.7.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AF6D6B90-62BA-4944-A699-6D7C48AFD0A1" }, { "criteria": "cpe:2.3:a:puppet:puppet:2.7.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8EC6A7B3-5949-4439-994A-68DA65438F5D" }, { "criteria": "cpe:2.3:a:puppet:puppet:2.7.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5140C34D-589C-43DB-BCA7-8434EB173205" }, { "criteria": "cpe:2.3:a:puppet:puppet:2.7.13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E561C081-6262-46D3-AB17-01EEA6D3E988" }, { "criteria": "cpe:2.3:a:puppet:puppet:2.7.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4703802D-0E3A-4760-B660-6AE0AF74DD40" }, { "criteria": "cpe:2.3:a:puppet:puppet:2.7.16:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BE3D39F6-F9C8-4E7F-981A-265B04E85579" }, { "criteria": "cpe:2.3:a:puppetlabs:puppet:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3A81EA6F-49C7-4883-8F93-E76A60DE1164", "versionEndIncluding": "2.7.17" }, { "criteria": "cpe:2.3:a:puppetlabs:puppet:2.7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1E5192CB-094F-469E-A644-2255C4F44804" }, { "criteria": "cpe:2.3:a:puppetlabs:puppet:2.7.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D17D2752-CB0D-4CC8-8604-FEBF8DEE16E0" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:puppet:puppet_enterprise:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F66C1E54-FBEA-4008-BC88-A390D415F3F5", "versionEndIncluding": "2.5.1" } ], "operator": "OR" } ] } ]