Lucene search

K
rubygemsRubySecRUBY:PUPPET-2012-1988
HistoryMay 13, 2022 - 9:00 p.m.

Puppet Arbitrary Command Execution

2022-05-1321:00:00
RubySec
github.com
3
puppet
command execution
authentication
file creation
shell metacharacters

CVSS2

6

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:P/I:P/A:P

AI Score

7.6

Confidence

High

Puppet 2.6.x before 2.6.15 and 2.7.x before 2.7.13, and Puppet Enterprise
(PE) Users 1.0, 1.1, 1.2.x, 2.0.x, and 2.5.x before 2.5.1 allows remote authenticated
users with agent SSL keys and file-creation permissions on the puppet master to
execute arbitrary commands by creating a file whose full pathname contains shell
metacharacters, then performing a filebucket request.

Affected configurations

Vulners
Node
rubypuppetRange2.6.02.6.15
OR
rubypuppetRange2.7.13
VendorProductVersionCPE
rubypuppet*cpe:2.3:a:ruby:puppet:*:*:*:*:*:*:*:*

CVSS2

6

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:P/I:P/A:P

AI Score

7.6

Confidence

High