[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2012-3865Date: (C)2012-08-06   (M)2024-02-09


Directory traversal vulnerability in lib/puppet/reports/store.rb in Puppet before 2.6.17 and 2.7.x before 2.7.18, and Puppet Enterprise before 2.5.2, when Delete is enabled in auth.conf, allows remote authenticated users to delete arbitrary files on the puppet master server via a .. (dot dot) in a node name.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 3.5
Exploit Score: 6.8
Impact Score: 2.9
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: MEDIUM
Authentication: SINGLE
Confidentiality: NONE
Integrity: NONE
Availability: PARTIAL
  
Reference:
SECUNIA-50014
DSA-2511
SUSE-SU-2012:0983
USN-1506-1
http://puppetlabs.com/security/cve/cve-2012-3865/
https://bugzilla.redhat.com/show_bug.cgi?id=839131
https://github.com/puppetlabs/puppet/commit/554eefc55f57ed2b76e5ee04d8f194d36f6ee67f
https://github.com/puppetlabs/puppet/commit/d80478208d79a3e6d6cb1fbc525e24817fe8c4c6
openSUSE-SU-2012:0891

CPE    3
cpe:/a:puppetlabs:puppet:2.7.1
cpe:/a:puppetlabs:puppet:2.7.0
cpe:/a:puppetlabs:puppet
CWE    1
CWE-22
OVAL    6
oval:org.secpod.oval:def:1601351
oval:org.secpod.oval:def:700936
oval:org.secpod.oval:def:104775
oval:org.secpod.oval:def:104016
...

© SecPod Technologies