Puppet Arbitrary Command Execution
Published: May 14, 2022
SECURITY IDENTIFIERS
- CVE: CVE-2012-1988 (NVD)
- GHSA: GHSA-6xxq-j39w-g3f6
GEM
SEVERITY
CVSS v2.0: 6.0 (Medium)
UNAFFECTED VERSIONS
< 2.6.0
PATCHED VERSIONS
~> 2.6.15
>= 2.7.13
DESCRIPTION
Puppet 2.6.x before 2.6.15 and 2.7.x before 2.7.13, and Puppet Enterprise (PE) Users 1.0, 1.1, 1.2.x, 2.0.x, and 2.5.x before 2.5.1 allows remote authenticated users with agent SSL keys and file-creation permissions on the puppet master to execute arbitrary commands by creating a file whose full pathname contains shell metacharacters, then performing a filebucket request.
RELATED
- https://nvd.nist.gov/vuln/detail/CVE-2012-1988
- https://web.archive.org/web/20121013181707/http://puppetlabs.com/security/cve/cve-2012-1988
- https://web.archive.org/web/20120513213112/http://projects.puppetlabs.com/issues/13518
- https://web.archive.org/web/20120816020421/http://projects.puppetlabs.com/projects/1/wiki/Release_Notes#2.6.15
- https://web.archive.org/web/20120415105345/http://www.securityfocus.com/bid/52975
- https://github.com/puppetlabs/puppet/commit/0d6d29933e613fe177e9235415919a5428db67bc
- https://github.com/puppetlabs/puppet/commit/568ded50ec6cc498ad32ff7f086d9f73b5d24c14
- https://exchange.xforce.ibmcloud.com/vulnerabilities/74796
- https://hermes.opensuse.org/messages/14523305
- https://hermes.opensuse.org/messages/15087408
- http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079227.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079289.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080003.html
- http://ubuntu.com/usn/usn-1419-1
- http://www.debian.org/security/2012/dsa-2451
- https://github.com/advisories/GHSA-6xxq-j39w-g3f6
