Directory traversal vulnerability in lib/puppet/reports/store.rb in Puppet before 2.6.17 and 2.7.x before 2.7.18, and Puppet Enterprise before 2.5.2, when Delete is enabled in auth.conf, allows remote authenticated users to delete arbitrary files on the puppet master server via a … (dot dot) in a node name.
lists.opensuse.org/opensuse-security-announce/2012-08/msg00006.html
lists.opensuse.org/opensuse-updates/2012-07/msg00036.html
puppetlabs.com/security/cve/cve-2012-3865/
secunia.com/advisories/50014
www.debian.org/security/2012/dsa-2511
www.ubuntu.com/usn/USN-1506-1
bugzilla.redhat.com/show_bug.cgi?id=839131
github.com/puppetlabs/puppet/commit/554eefc55f57ed2b76e5ee04d8f194d36f6ee67f
github.com/puppetlabs/puppet/commit/d80478208d79a3e6d6cb1fbc525e24817fe8c4c6