// For flags

CVE-2011-3870

Gentoo Linux Security Advisory 201203-03

Severity Score

7.1
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Puppet 2.7.x before 2.7.5, 2.6.x before 2.6.11, and 0.25.x allows local users to modify the permissions of arbitrary files via a symlink attack on the SSH authorized_keys file.

Puppet v2.7.x antes de v2.7.5, v2.6.x antes de v2.6.11, y v0.25.x, permite a usuarios locales modificar los permisos de archivos de su elección a través de un ataque symlink al archivo authorized_keys de SSH

USN-1223-1 fixed vulnerabilities in Puppet. A regression was found on Ubuntu 10.04 LTS that caused permission denied errors when managing SSH authorized_keys files with Puppet. This update fixes the problem. It was discovered that Puppet unsafely opened files when the k5login type is used to manage files. A local attacker could exploit this to overwrite arbitrary files which could be used to escalate privileges. Ricky Zhou discovered that Puppet did not drop privileges when creating SSH authorized_keys files. A local attacker could exploit this to overwrite arbitrary files as root. It was discovered that Puppet used a predictable filename when using the --edit resource. A local attacker could exploit this to edit arbitrary files or run arbitrary code as the user invoking the program, typically root. Various other issues were also addressed.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
High
Attack Vector
Local
Attack Complexity
Medium
Authentication
None
Confidentiality
None
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2011-09-29 CVE Reserved
  • 2011-10-03 CVE Published
  • 2024-08-06 CVE Updated
  • 2025-06-27 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-59: Improper Link Resolution Before File Access ('Link Following')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Puppet
Search vendor "Puppet"
Puppet
Search vendor "Puppet" for product "Puppet"
2.6.0
Search vendor "Puppet" for product "Puppet" and version "2.6.0"
-
Affected
Puppet
Search vendor "Puppet"
Puppet
Search vendor "Puppet" for product "Puppet"
2.6.1
Search vendor "Puppet" for product "Puppet" and version "2.6.1"
-
Affected
Puppet
Search vendor "Puppet"
Puppet
Search vendor "Puppet" for product "Puppet"
2.6.2
Search vendor "Puppet" for product "Puppet" and version "2.6.2"
-
Affected
Puppet
Search vendor "Puppet"
Puppet
Search vendor "Puppet" for product "Puppet"
2.6.3
Search vendor "Puppet" for product "Puppet" and version "2.6.3"
-
Affected
Puppet
Search vendor "Puppet"
Puppet
Search vendor "Puppet" for product "Puppet"
2.6.4
Search vendor "Puppet" for product "Puppet" and version "2.6.4"
-
Affected
Puppet
Search vendor "Puppet"
Puppet
Search vendor "Puppet" for product "Puppet"
2.6.5
Search vendor "Puppet" for product "Puppet" and version "2.6.5"
-
Affected
Puppet
Search vendor "Puppet"
Puppet
Search vendor "Puppet" for product "Puppet"
2.6.6
Search vendor "Puppet" for product "Puppet" and version "2.6.6"
-
Affected
Puppet
Search vendor "Puppet"
Puppet
Search vendor "Puppet" for product "Puppet"
2.6.7
Search vendor "Puppet" for product "Puppet" and version "2.6.7"
-
Affected
Puppet
Search vendor "Puppet"
Puppet
Search vendor "Puppet" for product "Puppet"
2.6.8
Search vendor "Puppet" for product "Puppet" and version "2.6.8"
-
Affected
Puppet
Search vendor "Puppet"
Puppet
Search vendor "Puppet" for product "Puppet"
2.6.9
Search vendor "Puppet" for product "Puppet" and version "2.6.9"
-
Affected
Puppet
Search vendor "Puppet"
Puppet
Search vendor "Puppet" for product "Puppet"
2.6.10
Search vendor "Puppet" for product "Puppet" and version "2.6.10"
-
Affected
Puppet
Search vendor "Puppet"
Puppet
Search vendor "Puppet" for product "Puppet"
2.7.2
Search vendor "Puppet" for product "Puppet" and version "2.7.2"
-
Affected
Puppet
Search vendor "Puppet"
Puppet
Search vendor "Puppet" for product "Puppet"
2.7.3
Search vendor "Puppet" for product "Puppet" and version "2.7.3"
-
Affected
Puppet
Search vendor "Puppet"
Puppet
Search vendor "Puppet" for product "Puppet"
2.7.4
Search vendor "Puppet" for product "Puppet" and version "2.7.4"
-
Affected
Puppetlabs
Search vendor "Puppetlabs"
Puppet
Search vendor "Puppetlabs" for product "Puppet"
2.7.0
Search vendor "Puppetlabs" for product "Puppet" and version "2.7.0"
-
Affected
Puppetlabs
Search vendor "Puppetlabs"
Puppet
Search vendor "Puppetlabs" for product "Puppet"
2.7.1
Search vendor "Puppetlabs" for product "Puppet" and version "2.7.1"
-
Affected
Puppet
Search vendor "Puppet"
Puppet
Search vendor "Puppet" for product "Puppet"
0.25.0
Search vendor "Puppet" for product "Puppet" and version "0.25.0"
-
Affected
Puppet
Search vendor "Puppet"
Puppet
Search vendor "Puppet" for product "Puppet"
0.25.1
Search vendor "Puppet" for product "Puppet" and version "0.25.1"
-
Affected
Puppet
Search vendor "Puppet"
Puppet
Search vendor "Puppet" for product "Puppet"
0.25.2
Search vendor "Puppet" for product "Puppet" and version "0.25.2"
-
Affected
Puppet
Search vendor "Puppet"
Puppet
Search vendor "Puppet" for product "Puppet"
0.25.3
Search vendor "Puppet" for product "Puppet" and version "0.25.3"
-
Affected
Puppet
Search vendor "Puppet"
Puppet
Search vendor "Puppet" for product "Puppet"
0.25.4
Search vendor "Puppet" for product "Puppet" and version "0.25.4"
-
Affected
Puppet
Search vendor "Puppet"
Puppet
Search vendor "Puppet" for product "Puppet"
0.25.5
Search vendor "Puppet" for product "Puppet" and version "0.25.5"
-
Affected
Puppet
Search vendor "Puppet"
Puppet
Search vendor "Puppet" for product "Puppet"
0.25.6
Search vendor "Puppet" for product "Puppet" and version "0.25.6"
-
Affected