Lucene search

K
rubygemsRubySecRUBY:PUPPET-2012-1987
HistoryMay 13, 2022 - 9:00 p.m.

Puppet Denial of Service and Arbitrary File Write

2022-05-1321:00:00
RubySec
github.com
10
puppet
vulnerability
denial of service
arbitrary file write
remote authenticated users
ssl keys
memory consumption
rest request
thread block
cve-2012-1986
filesystem consumption
crafted rest requests
puppet enterprise

CVSS2

3.5

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:N/I:N/A:P

AI Score

6.5

Confidence

Low

EPSS

0.002

Percentile

65.0%

A vulnerability in Puppet 2.6.x before 2.6.15 and 2.7.x before 2.7.13,
and Puppet Enterprise (PE) Users 1.0, 1.1, 1.2.x, 2.0.x, and 2.5.x before 2.5.1
allows remote authenticated users with agent SSL keys to (1) cause a denial
of service (memory consumption) via a REST request to a stream that triggers a thread
block, as demonstrated using CVE-2012-1986 and /dev/random; or (2) cause a
denial of service (filesystem consumption) via crafted REST requests that use “a
marshaled form of a Puppet::FileBucket::File object” to write to arbitrary file
locations.

Affected configurations

Vulners
Node
rubypuppetRange2.6.02.6.15
OR
rubypuppetRange2.7.13
VendorProductVersionCPE
rubypuppet*cpe:2.3:a:ruby:puppet:*:*:*:*:*:*:*:*

CVSS2

3.5

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:N/I:N/A:P

AI Score

6.5

Confidence

Low

EPSS

0.002

Percentile

65.0%