CVE-2012-1988

EUVD-2022-2885
Puppet 2.6.x before 2.6.15 and 2.7.x before 2.7.13, and Puppet Enterprise (PE) Users 1.0, 1.1, 1.2.x, 2.0.x, and 2.5.x before 2.5.1 allows remote authenticated users with agent SSL keys and file-creation permissions on the puppet master to execute arbitrary commands by creating a file whose full pathname contains shell metacharacters, then performing a filebucket request.
OS Command Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
6 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:S/C:P/I:P/A:P
Base Score
CVSS 3.x
EPSS Score
Percentile: 65%
Affected Products (NVD)
VendorProductVersion
puppetpuppet
2.6.0 ≤
𝑥
< 2.6.15
puppetpuppet
2.7.0 ≤
𝑥
< 2.7.13
puppetpuppet_enterprise
1.2.0 ≤
𝑥
< 2.5.1
puppetpuppet_enterprise
1.0
puppetpuppet_enterprise
1.1
debiandebian_linux
6.0
debiandebian_linux
7.0
canonicalubuntu_linux
10.04
canonicalubuntu_linux
11.04
canonicalubuntu_linux
11.10
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
puppet
bullseye
5.5.22-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
puppet
hardy
ignored
lucid
Fixed 0.25.4-2ubuntu6.7
released
maverick
ignored
natty
Fixed 2.6.4-2ubuntu2.9
released
oneiric
Fixed 2.7.1-1ubuntu3.6
released
References