Directory traversal vulnerability in Puppet 2.6.x prior to 2.6.10 and 2.7.x prior to 2.7.4 allows remote malicious users to write X.509 Certificate Signing Request (CSR) to arbitrary locations via (1) a double-encoded key parameter in the URI in 2.7.x, (2) the CN in the Subject of a CSR in 2.6 and 0.25.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
puppet puppet 2.6.2 |
||
puppet puppet 2.6.3 |
||
puppetlabs puppet 2.7.0 |
||
puppetlabs puppet 2.7.1 |
||
puppet puppet 2.6.0 |
||
puppet puppet 2.6.1 |
||
puppet puppet 2.6.8 |
||
puppet puppet 2.6.9 |
||
puppet puppet 2.6.6 |
||
puppet puppet 2.6.7 |
||
puppet puppet 2.6.4 |
||
puppet puppet 2.6.5 |
||
puppet puppet 2.7.2 |
||
puppet puppet 2.7.3 |