CVE-2012-1988
puppet: Filebucket arbitrary code execution
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Puppet 2.6.x before 2.6.15 and 2.7.x before 2.7.13, and Puppet Enterprise (PE) Users 1.0, 1.1, 1.2.x, 2.0.x, and 2.5.x before 2.5.1 allows remote authenticated users with agent SSL keys and file-creation permissions on the puppet master to execute arbitrary commands by creating a file whose full pathname contains shell metacharacters, then performing a filebucket request.
Puppet v2.6.x anterior a v2.6.15 y v2.7.x anterior a v2.7.13, y Puppet Enterprise (PE) Users v1.0, v1.1, v1.2.x, v2.0.x, y v2.5.x anterior a v2.5.1 permite a usuarios remotos autenticados con el agente de claves SSL y permisos de creación de archivos en el puppet maestro ejecutar comandos arbitrarios mediante la creación de un archivo cuyo nombre de ruta completo contiene metacaracteres de shell, para realizar una solicitud "filebucket". telnet.rb en v2.7.x anterior a v2.7.13 y Puppet Enterprise (PE) v1.2.x, v2.0.x y v2.5.x anterior a v2.5.1 permite a usuarios locales sobreescribir ficheros arbitrarios mediante un ataque de enlace simbólico en el log de registro NET::Telnet (/tmp/out.log).
CVSS Scores
SSVC
- Decision:-
Timeline
- 2012-04-02 CVE Reserved
- 2012-04-11 CVE Published
- 2024-02-03 EPSS Updated
- 2024-08-06 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CAPEC
References (19)
URL | Tag | Source |
---|---|---|
http://projects.puppetlabs.com/projects/1/wiki/Release_Notes#2.6.15 | Broken Link | |
http://www.osvdb.org/81309 | Broken Link | |
http://www.securityfocus.com/bid/52975 | Broken Link | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/74796 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079227.html | 2024-02-02 | |
http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079289.html | 2024-02-02 | |
http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080003.html | 2024-02-02 | |
http://projects.puppetlabs.com/issues/13518 | 2024-02-02 | |
http://puppetlabs.com/security/cve/cve-2012-1988 | 2024-02-02 | |
http://secunia.com/advisories/48743 | 2024-02-02 | |
http://secunia.com/advisories/48748 | 2024-02-02 | |
http://secunia.com/advisories/48789 | 2024-02-02 | |
http://secunia.com/advisories/49136 | 2024-02-02 | |
http://ubuntu.com/usn/usn-1419-1 | 2024-02-02 | |
http://www.debian.org/security/2012/dsa-2451 | 2024-02-02 | |
https://hermes.opensuse.org/messages/14523305 | 2024-02-02 | |
https://hermes.opensuse.org/messages/15087408 | 2024-02-02 | |
https://access.redhat.com/security/cve/CVE-2012-1988 | 2012-12-04 | |
https://bugzilla.redhat.com/show_bug.cgi?id=810071 | 2012-12-04 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Puppet Search vendor "Puppet" | Puppet Search vendor "Puppet" for product "Puppet" | >= 2.6.0 < 2.6.15 Search vendor "Puppet" for product "Puppet" and version " >= 2.6.0 < 2.6.15" | - |
Affected
| ||||||
Puppet Search vendor "Puppet" | Puppet Search vendor "Puppet" for product "Puppet" | >= 2.7.0 < 2.7.13 Search vendor "Puppet" for product "Puppet" and version " >= 2.7.0 < 2.7.13" | - |
Affected
| ||||||
Puppet Search vendor "Puppet" | Puppet Enterprise Search vendor "Puppet" for product "Puppet Enterprise" | >= 1.2.0 < 2.5.1 Search vendor "Puppet" for product "Puppet Enterprise" and version " >= 1.2.0 < 2.5.1" | - |
Affected
| ||||||
Puppet Search vendor "Puppet" | Puppet Enterprise Search vendor "Puppet" for product "Puppet Enterprise" | 1.0 Search vendor "Puppet" for product "Puppet Enterprise" and version "1.0" | - |
Affected
| ||||||
Puppet Search vendor "Puppet" | Puppet Enterprise Search vendor "Puppet" for product "Puppet Enterprise" | 1.1 Search vendor "Puppet" for product "Puppet Enterprise" and version "1.1" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 15 Search vendor "Fedoraproject" for product "Fedora" and version "15" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 16 Search vendor "Fedoraproject" for product "Fedora" and version "16" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 17 Search vendor "Fedoraproject" for product "Fedora" and version "17" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 6.0 Search vendor "Debian" for product "Debian Linux" and version "6.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 7.0 Search vendor "Debian" for product "Debian Linux" and version "7.0" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 10.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "10.04" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 11.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "11.04" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 11.10 Search vendor "Canonical" for product "Ubuntu Linux" and version "11.10" | - |
Affected
|