Puppet 2.6.x before 2.6.15 and 2.7.x before 2.7.13, and Puppet Enterprise (PE) Users 1.0, 1.1, 1.2.x, 2.0.x, and 2.5.x before 2.5.1 allows remote authenticated users with agent SSL keys and file-creation permissions on the puppet master to execute arbitrary commands by creating a file whose full pathname contains shell metacharacters, then performing a filebucket request.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
21 Nov 2024, 01:38
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079227.html - Mailing List, Third Party Advisory | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079289.html - Mailing List, Third Party Advisory | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080003.html - Mailing List, Third Party Advisory | |
References | () http://projects.puppetlabs.com/issues/13518 - Broken Link, Vendor Advisory | |
References | () http://projects.puppetlabs.com/projects/1/wiki/Release_Notes#2.6.15 - Broken Link | |
References | () http://puppetlabs.com/security/cve/cve-2012-1988/ - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/48743 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/48748 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/48789 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/49136 - Broken Link, Vendor Advisory | |
References | () http://ubuntu.com/usn/usn-1419-1 - Third Party Advisory | |
References | () http://www.debian.org/security/2012/dsa-2451 - Third Party Advisory | |
References | () http://www.osvdb.org/81309 - Broken Link | |
References | () http://www.securityfocus.com/bid/52975 - Broken Link, Third Party Advisory, VDB Entry | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/74796 - Third Party Advisory, VDB Entry | |
References | () https://hermes.opensuse.org/messages/14523305 - Broken Link | |
References | () https://hermes.opensuse.org/messages/15087408 - Broken Link |
02 Feb 2024, 15:14
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:puppet:puppet:2.6.2:*:*:*:*:*:*:* cpe:2.3:a:puppet:puppet_enterprise:1.2.2:*:*:*:*:*:*:* cpe:2.3:a:puppet:puppet:2.6.5:*:*:*:*:*:*:* cpe:2.3:a:puppet:puppet:2.6.7:*:*:*:*:*:*:* cpe:2.3:a:puppet:puppet:2.6.9:*:*:*:*:*:*:* cpe:2.3:a:puppet:puppet_enterprise:2.0.2:*:*:*:*:*:*:* cpe:2.3:a:puppet:puppet:2.7.7:*:*:*:*:*:*:* cpe:2.3:a:puppet:puppet:2.6.8:*:*:*:*:*:*:* cpe:2.3:a:puppet:puppet:2.7.8:*:*:*:*:*:*:* cpe:2.3:a:puppet:puppet:2.6.11:*:*:*:*:*:*:* cpe:2.3:a:puppet:puppet:2.7.6:*:*:*:*:*:*:* cpe:2.3:a:puppet:puppet_enterprise:2.0.1:*:*:*:*:*:*:* cpe:2.3:a:puppetlabs:puppet:2.7.0:*:*:*:*:*:*:* cpe:2.3:a:puppet:puppet_enterprise:2.0.0:*:*:*:*:*:*:* cpe:2.3:a:puppet:puppet:2.6.0:*:*:*:*:*:*:* cpe:2.3:a:puppet:puppet:2.6.13:*:*:*:*:*:*:* cpe:2.3:a:puppet:puppet_enterprise:2.5.0:*:*:*:*:*:*:* cpe:2.3:a:puppet:puppet:2.6.10:*:*:*:*:*:*:* cpe:2.3:a:puppet:puppet:2.6.3:*:*:*:*:*:*:* cpe:2.3:a:puppet:puppet:2.7.5:*:*:*:*:*:*:* cpe:2.3:a:puppet:puppet_enterprise:1.2.3:*:*:*:*:*:*:* cpe:2.3:a:puppetlabs:puppet:2.7.1:*:*:*:*:*:*:* cpe:2.3:a:puppet:puppet_enterprise:1.2.1:*:*:*:*:*:*:* cpe:2.3:a:puppet:puppet:2.7.10:*:*:*:*:*:*:* cpe:2.3:a:puppet:puppet:2.7.2:*:*:*:*:*:*:* cpe:2.3:a:puppet:puppet:2.7.3:*:*:*:*:*:*:* cpe:2.3:a:puppet:puppet:2.7.4:*:*:*:*:*:*:* cpe:2.3:a:puppetlabs:puppet_enterprise_users:1.1:*:*:*:*:*:*:* cpe:2.3:a:puppet:puppet:2.6.12:*:*:*:*:*:*:* cpe:2.3:a:puppet:puppet:2.6.1:*:*:*:*:*:*:* cpe:2.3:a:puppetlabs:puppet_enterprise_users:1.0:*:*:*:*:*:*:* cpe:2.3:a:puppet:puppet_enterprise:1.2.0:*:*:*:*:*:*:* cpe:2.3:a:puppet:puppet:2.6.4:*:*:*:*:*:*:* cpe:2.3:a:puppet:puppet:2.7.11:*:*:*:*:*:*:* cpe:2.3:a:puppet:puppet:2.6.6:*:*:*:*:*:*:* cpe:2.3:a:puppet:puppet_enterprise:1.2.4:*:*:*:*:*:*:* cpe:2.3:a:puppet:puppet:2.6.14:*:*:*:*:*:*:* |
cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:* cpe:2.3:a:puppet:puppet_enterprise:1.1:*:*:*:*:*:*:* cpe:2.3:a:puppet:puppet_enterprise:1.0:*:*:*:*:*:*:* cpe:2.3:a:puppet:puppet:*:*:*:*:*:*:*:* cpe:2.3:a:puppet:puppet_enterprise:*:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:15:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:* |
First Time |
Debian debian Linux
Canonical ubuntu Linux Debian Canonical Fedoraproject Fedoraproject fedora |
|
References | (SUSE) https://hermes.opensuse.org/messages/15087408 - Broken Link | |
References | (FEDORA) http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079289.html - Mailing List, Third Party Advisory | |
References | (BID) http://www.securityfocus.com/bid/52975 - Broken Link, Third Party Advisory, VDB Entry | |
References | (MISC) http://projects.puppetlabs.com/issues/13518 - Broken Link, Vendor Advisory | |
References | (FEDORA) http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080003.html - Mailing List, Third Party Advisory | |
References | (CONFIRM) http://projects.puppetlabs.com/projects/1/wiki/Release_Notes#2.6.15 - Broken Link | |
References | (FEDORA) http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079227.html - Mailing List, Third Party Advisory | |
References | (CONFIRM) http://puppetlabs.com/security/cve/cve-2012-1988/ - Broken Link, Vendor Advisory | |
References | (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/74796 - Third Party Advisory, VDB Entry | |
References | (SECUNIA) http://secunia.com/advisories/48743 - Broken Link, Vendor Advisory | |
References | (UBUNTU) http://ubuntu.com/usn/usn-1419-1 - Third Party Advisory | |
References | (SECUNIA) http://secunia.com/advisories/48789 - Broken Link, Vendor Advisory | |
References | (SECUNIA) http://secunia.com/advisories/49136 - Broken Link, Vendor Advisory | |
References | (SECUNIA) http://secunia.com/advisories/48748 - Broken Link, Vendor Advisory | |
References | (DEBIAN) http://www.debian.org/security/2012/dsa-2451 - Third Party Advisory | |
References | (SUSE) https://hermes.opensuse.org/messages/14523305 - Broken Link | |
References | (OSVDB) http://www.osvdb.org/81309 - Broken Link | |
CWE | CWE-78 |
Information
Published : 2012-05-29 20:55
Updated : 2025-04-11 00:51
NVD link : CVE-2012-1988
Mitre link : CVE-2012-1988
CVE.ORG link : CVE-2012-1988
JSON object : View
Products Affected
debian
- debian_linux
fedoraproject
- fedora
puppet
- puppet
- puppet_enterprise
canonical
- ubuntu_linux
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')