Lucene search

K
rubygemsRubySecRUBY:PUPPET-2012-1906
HistoryMay 28, 2012 - 8:00 p.m.

Puppet uses predictable filenames, allowing arbitrary file overwrite

2012-05-2820:00:00
RubySec
exchange.xforce.ibmcloud.com
3

CVSS2

3.3

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:M/Au:N/C:N/I:P/A:P

Puppet 2.6.x before 2.6.15 and 2.7.x before 2.7.13, and Puppet Enterprise
(PE) Users 1.0, 1.1, 1.2.x, 2.0.x, and 2.5.x before 2.5.1 uses predictable file
names when installing Mac OS X packages from a remote source, which allows local
users to overwrite arbitrary files or install arbitrary packages via a symlink attack
on a temporary file in /tmp.

Affected configurations

Vulners
Node
rubypuppetRange2.6.02.6.15
OR
rubypuppetRange2.7.13
VendorProductVersionCPE
rubypuppet*cpe:2.3:a:ruby:puppet:*:*:*:*:*:*:*:*

CVSS2

3.3

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:M/Au:N/C:N/I:P/A:P