Information disclosure in Puppet



| Updated: 2020-08-11
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2012-3864
CWE-ID CWE-200
Exploitation vector Network
Public exploit N/A
Vulnerable software
Puppet Agent
Server applications / Conferencing, Collaboration and VoIP solutions

Vendor Puppet Labs

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Information disclosure

EUVDB-ID: #VU43767

Risk: Low

CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2012-3864

CWE-ID: CWE-200 - Exposure of sensitive information to an unauthorized actor

Exploit availability: No

Description

The vulnerability allows a remote #AU# to gain access to sensitive information.

Puppet before 2.6.17 and 2.7.x before 2.7.18, and Puppet Enterprise before 2.5.2, allows remote authenticated users to read arbitrary files on the puppet master server by leveraging an arbitrary user's certificate and private key in a GET request.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Puppet Agent:

CPE2.3 External links

https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00006.html
https://lists.opensuse.org/opensuse-updates/2012-07/msg00036.html
https://puppetlabs.com/security/cve/cve-2012-3864/
https://secunia.com/advisories/50014
https://www.debian.org/security/2012/dsa-2511
https://www.ubuntu.com/usn/USN-1506-1
https://bugzilla.redhat.com/show_bug.cgi?id=839130
https://github.com/puppetlabs/puppet/commit/10f6cb8969b4d5a933b333ecb01ce3696b1d57d4
https://github.com/puppetlabs/puppet/commit/c3c7462e4066bf3a563987a402bf3ddf278bcd87


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###