Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2012-3864 |
CWE-ID | CWE-200 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
Puppet Agent Server applications / Conferencing, Collaboration and VoIP solutions |
Vendor | Puppet Labs |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU43767
Risk: Low
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2012-3864
CWE-ID:
CWE-200 - Exposure of sensitive information to an unauthorized actor
Exploit availability: No
DescriptionThe vulnerability allows a remote #AU# to gain access to sensitive information.
Puppet before 2.6.17 and 2.7.x before 2.7.18, and Puppet Enterprise before 2.5.2, allows remote authenticated users to read arbitrary files on the puppet master server by leveraging an arbitrary user's certificate and private key in a GET request.
MitigationInstall update from vendor's website.
Vulnerable software versionsPuppet Agent:
CPE2.3 External linkshttps://lists.opensuse.org/opensuse-security-announce/2012-08/msg00006.html
https://lists.opensuse.org/opensuse-updates/2012-07/msg00036.html
https://puppetlabs.com/security/cve/cve-2012-3864/
https://secunia.com/advisories/50014
https://www.debian.org/security/2012/dsa-2511
https://www.ubuntu.com/usn/USN-1506-1
https://bugzilla.redhat.com/show_bug.cgi?id=839130
https://github.com/puppetlabs/puppet/commit/10f6cb8969b4d5a933b333ecb01ce3696b1d57d4
https://github.com/puppetlabs/puppet/commit/c3c7462e4066bf3a563987a402bf3ddf278bcd87
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.