// For flags

CVE-2011-3848

 

Severity Score

5.0
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Directory traversal vulnerability in Puppet 2.6.x before 2.6.10 and 2.7.x before 2.7.4 allows remote attackers to write X.509 Certificate Signing Request (CSR) to arbitrary locations via (1) a double-encoded key parameter in the URI in 2.7.x, (2) the CN in the Subject of a CSR in 2.6 and 0.25.

Vulnerabilidad de salto de directorio en Puppet v2.6.x antes de v2.6.10 y v2.7.x antes de v2.7.4, permite a atacantes remotos escribir Certificate Signing Request (CSR) X.509 en ubicaciones de su elección a través de (1) un parámetro clave de doble codificación en la URI en v2.7.x, (2) el CN en el Subject de un CSR en v2.6 y v0.25.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2011-09-27 CVE Reserved
  • 2011-09-29 CVE Published
  • 2023-03-07 EPSS Updated
  • 2024-08-06 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Puppet
Search vendor "Puppet"
Puppet
Search vendor "Puppet" for product "Puppet"
2.6.0
Search vendor "Puppet" for product "Puppet" and version "2.6.0"
-
Affected
Puppet
Search vendor "Puppet"
Puppet
Search vendor "Puppet" for product "Puppet"
2.6.1
Search vendor "Puppet" for product "Puppet" and version "2.6.1"
-
Affected
Puppet
Search vendor "Puppet"
Puppet
Search vendor "Puppet" for product "Puppet"
2.6.2
Search vendor "Puppet" for product "Puppet" and version "2.6.2"
-
Affected
Puppet
Search vendor "Puppet"
Puppet
Search vendor "Puppet" for product "Puppet"
2.6.3
Search vendor "Puppet" for product "Puppet" and version "2.6.3"
-
Affected
Puppet
Search vendor "Puppet"
Puppet
Search vendor "Puppet" for product "Puppet"
2.6.4
Search vendor "Puppet" for product "Puppet" and version "2.6.4"
-
Affected
Puppet
Search vendor "Puppet"
Puppet
Search vendor "Puppet" for product "Puppet"
2.6.5
Search vendor "Puppet" for product "Puppet" and version "2.6.5"
-
Affected
Puppet
Search vendor "Puppet"
Puppet
Search vendor "Puppet" for product "Puppet"
2.6.6
Search vendor "Puppet" for product "Puppet" and version "2.6.6"
-
Affected
Puppet
Search vendor "Puppet"
Puppet
Search vendor "Puppet" for product "Puppet"
2.6.7
Search vendor "Puppet" for product "Puppet" and version "2.6.7"
-
Affected
Puppet
Search vendor "Puppet"
Puppet
Search vendor "Puppet" for product "Puppet"
2.6.8
Search vendor "Puppet" for product "Puppet" and version "2.6.8"
-
Affected
Puppet
Search vendor "Puppet"
Puppet
Search vendor "Puppet" for product "Puppet"
2.6.9
Search vendor "Puppet" for product "Puppet" and version "2.6.9"
-
Affected
Puppet
Search vendor "Puppet"
Puppet
Search vendor "Puppet" for product "Puppet"
2.7.2
Search vendor "Puppet" for product "Puppet" and version "2.7.2"
-
Affected
Puppet
Search vendor "Puppet"
Puppet
Search vendor "Puppet" for product "Puppet"
2.7.3
Search vendor "Puppet" for product "Puppet" and version "2.7.3"
-
Affected
Puppetlabs
Search vendor "Puppetlabs"
Puppet
Search vendor "Puppetlabs" for product "Puppet"
2.7.0
Search vendor "Puppetlabs" for product "Puppet" and version "2.7.0"
-
Affected
Puppetlabs
Search vendor "Puppetlabs"
Puppet
Search vendor "Puppetlabs" for product "Puppet"
2.7.1
Search vendor "Puppetlabs" for product "Puppet" and version "2.7.1"
-
Affected