6.2
CVSSv2

CVE-2011-3871

Published: 27/10/2011 Updated: 10/07/2019
CVSS v2 Base Score: 6.2 | Impact Score: 10 | Exploitability Score: 1.9
VMScore: 552
Vector: AV:L/AC:H/Au:N/C:C/I:C/A:C

Vulnerability Summary

Puppet 2.7.x prior to 2.7.5, 2.6.x prior to 2.6.11, and 0.25.x, when running in --edit mode, uses a predictable file name, which allows local users to run arbitrary Puppet code or trick a user into editing arbitrary files.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

puppet puppet 2.7.2

puppetlabs puppet 2.7.1

puppet puppet 2.6.4

puppet puppet 2.6.3

puppet puppet 2.6.10

puppet puppet 2.6.0

puppet puppet 2.6.6

puppet puppet 2.6.5

puppetlabs puppet 2.7.0

puppet puppet 2.7.4

puppet puppet 2.6.2

puppet puppet 2.6.1

puppet puppet 2.7.3

puppet puppet 2.6.9

puppet puppet 2.6.8

puppet puppet 2.6.7

puppet puppet 0.25.4

puppet puppet 0.25.5

puppet puppet 0.25.3

puppet puppet 0.25.2

puppet puppet 0.25.1

puppet puppet 0.25.0

puppet puppet 0.25.6

Vendor Advisories

Puppet could be made to overwrite files and run programs with administrator privileges ...
USN-1223-1 caused a regression with managing SSH authorized_keys files ...
Multiple security issues have been discovered in Puppet, a centralized configuration management system The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2011-3848 Kristian Erik Hermansen reported that an unauthenticated directory traversal could drop any valid X509 Certificate Signing Request at ...
Puppet 27x before 275, 26x before 2611, and 025x, when running in --edit mode, uses a predictable file name, which allows local users to run arbitrary Puppet code or trick a user into editing arbitrary files Puppet 27x before 275, 26x before 2611, and 025x allows local users to modify the permissions of arbitrary files via a sy ...