Lucene search

K
githubGitHub Advisory DatabaseGHSA-V58W-6XC2-W799
HistoryMay 14, 2022 - 12:56 a.m.

Puppet Denial of Service and Arbitrary File Write

2022-05-1400:56:45
CWE-400
GitHub Advisory Database
github.com
9
puppet
denial of service
arbitrary file write
vulnerability
remote authenticated users
ssl keys
memory consumption
rest request
thread block
cve-2012-1986
filesystem consumption
crafted rest requests
puppet::filebucket::file object

CVSS2

3.5

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:N/I:N/A:P

AI Score

7

Confidence

High

EPSS

0.012

Percentile

85.5%

A vulnerability in Puppet 2.6.x before 2.6.15 and 2.7.x before 2.7.13, and Puppet Enterprise (PE) Users 1.0, 1.1, 1.2.x, 2.0.x, and 2.5.x before 2.5.1 allows remote authenticated users with agent SSL keys to (1) cause a denial of service (memory consumption) via a REST request to a stream that triggers a thread block, as demonstrated using CVE-2012-1986 and /dev/random; or**(2)** cause a denial of service (filesystem consumption) via crafted REST requests that use “a marshaled form of a Puppet::FileBucket::File object” to write to arbitrary file locations.

Affected configurations

Vulners
Node
puppetpuppetRange2.7.02.7.13
OR
puppetpuppetRange2.6.02.6.15
VendorProductVersionCPE
puppetpuppet*cpe:2.3:a:puppet:puppet:*:*:*:*:*:*:*:*

References

CVSS2

3.5

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:N/I:N/A:P

AI Score

7

Confidence

High

EPSS

0.012

Percentile

85.5%