Lucene search

K
githubGitHub Advisory DatabaseGHSA-G89M-3WJW-H857
HistoryOct 24, 2017 - 6:33 p.m.

Puppet vulnerable to Path Traversal

2017-10-2418:33:37
CWE-22
GitHub Advisory Database
github.com
11

3.5 Low

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:N/I:N/A:P

0.009 Low

EPSS

Percentile

82.8%

Directory traversal vulnerability in lib/puppet/reports/store.rb in Puppet before 2.6.17 and 2.7.x before 2.7.18, and Puppet Enterprise before 2.5.2, when Delete is enabled in auth.conf, allows remote authenticated users to delete arbitrary files on the puppet master server via a .. (dot dot) in a node name.

CPENameOperatorVersion
puppetlt2.7.18
puppetlt2.6.17

3.5 Low

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:N/I:N/A:P

0.009 Low

EPSS

Percentile

82.8%