Lucene search

K
githubGitHub Advisory DatabaseGHSA-MPMX-GM5V-Q789
HistoryMay 14, 2022 - 12:56 a.m.

Puppet uses predictable filenames, allowing arbitrary file overwrite

2022-05-1400:56:55
CWE-340
GitHub Advisory Database
github.com
5
puppet
predictable filenames
arbitrary file overwrite
software
local users

CVSS2

6.2

Attack Vector

LOCAL

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:H/Au:N/C:C/I:C/A:C

AI Score

6.6

Confidence

Low

EPSS

0

Percentile

5.1%

Puppet 2.7.x before 2.7.5, 2.6.x before 2.6.11, and 0.25.x, when running in --edit mode, uses a predictable file name, which allows local users to run arbitrary Puppet code or trick a user into editing arbitrary files.

Affected configurations

Vulners
Node
puppetpuppetRange<2.7.5
OR
puppetpuppetRange<2.6.11
CPENameOperatorVersion
puppetlt2.7.5
puppetlt2.6.11

CVSS2

6.2

Attack Vector

LOCAL

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:H/Au:N/C:C/I:C/A:C

AI Score

6.6

Confidence

Low

EPSS

0

Percentile

5.1%