CVE-2012-1988

Puppet 2.6.x before 2.6.15 and 2.7.x before 2.7.13, and Puppet Enterprise (PE) Users 1.0, 1.1, 1.2.x, 2.0.x, and 2.5.x before 2.5.1 allows remote authenticated users with agent SSL keys and file-creation permissions on the puppet master to execute arbitrary commands by creating a file whose full pathname contains shell metacharacters, then performing a filebucket request.
OS Command Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:S/C:P/I:P/A:P
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 61%
VendorProductVersion
puppetpuppet
2.6.0 ≤
𝑥
< 2.6.15
puppetpuppet
2.7.0 ≤
𝑥
< 2.7.13
puppetpuppet_enterprise
1.2.0 ≤
𝑥
< 2.5.1
puppetpuppet_enterprise
1.0
puppetpuppet_enterprise
1.1
debiandebian_linux
6.0
debiandebian_linux
7.0
canonicalubuntu_linux
10.04
canonicalubuntu_linux
11.04
canonicalubuntu_linux
11.10
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
puppet
bullseye
5.5.22-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
puppet
oneiric
Fixed 2.7.1-1ubuntu3.6
released
natty
Fixed 2.6.4-2ubuntu2.9
released
maverick
ignored
lucid
Fixed 0.25.4-2ubuntu6.7
released
hardy
ignored
References