CVE-2011-3871

EUVD-2022-4604
Puppet 2.7.x before 2.7.5, 2.6.x before 2.6.11, and 0.25.x, when running in --edit mode, uses a predictable file name, which allows local users to run arbitrary Puppet code or trick a user into editing arbitrary files.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
6.2 UNKNOWN
LOCAL
HIGH
AV:L/AC:H/Au:N/C:C/I:C/A:C
Base Score
CVSS 3.x
EPSS Score
Percentile: 12%
Affected Products (NVD)
VendorProductVersion
puppetpuppet
2.6.0
puppetpuppet
2.6.1
puppetpuppet
2.6.2
puppetpuppet
2.6.3
puppetpuppet
2.6.4
puppetpuppet
2.6.5
puppetpuppet
2.6.6
puppetpuppet
2.6.7
puppetpuppet
2.6.8
puppetpuppet
2.6.9
puppetpuppet
2.6.10
puppetpuppet
2.7.2
puppetpuppet
2.7.3
puppetpuppet
2.7.4
puppetlabspuppet
2.7.0
puppetlabspuppet
2.7.1
puppetpuppet
0.25.0
puppetpuppet
0.25.1
puppetpuppet
0.25.2
puppetpuppet
0.25.3
puppetpuppet
0.25.4
puppetpuppet
0.25.5
puppetpuppet
0.25.6
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
puppet
bullseye
5.5.22-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
puppet
hardy
not-affected
lucid
Fixed 0.25.4-2ubuntu6.3
released
maverick
Fixed 2.6.1-0ubuntu2.2
released
natty
Fixed 2.6.4-2ubuntu2.3
released
Common Weakness Enumeration