Lucene search

K
githubGitHub Advisory DatabaseGHSA-C4MC-49HQ-Q275
HistoryMay 14, 2022 - 12:56 a.m.

Puppet uses predictable filenames, allowing arbitrary file overwrite

2022-05-1400:56:45
CWE-377
GitHub Advisory Database
github.com
28
puppet
predictable filenames
mac os x
arbitrary files
symlink attack

CVSS2

3.3

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:M/Au:N/C:N/I:P/A:P

EPSS

0

Percentile

5.1%

Puppet 2.6.x before 2.6.15 and 2.7.x before 2.7.13, and Puppet Enterprise (PE) Users 1.0, 1.1, 1.2.x, 2.0.x, and 2.5.x before 2.5.1 uses predictable file names when installing Mac OS X packages from a remote source, which allows local users to overwrite arbitrary files or install arbitrary packages via a symlink attack on a temporary file in /tmp.

Affected configurations

Vulners
Node
puppetpuppetRange2.72.7.13
OR
puppetpuppetRange2.62.6.15
VendorProductVersionCPE
puppetpuppet*cpe:2.3:a:puppet:puppet:*:*:*:*:*:*:*:*

CVSS2

3.3

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:M/Au:N/C:N/I:P/A:P

EPSS

0

Percentile

5.1%