SB2012080604 - Multiple vulnerabilities in Puppet



SB2012080604 - Multiple vulnerabilities in Puppet

Published: August 6, 2012 Updated: December 8, 2022

Security Bulletin ID SB2012080604
Severity
Low
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Path traversal (CVE-ID: CVE-2012-3865)

The vulnerability allows a remote attacker to perform directory traversal attacks.

The vulnerability exists due to input validation error when processing directory traversal sequences in lib/puppet/reports/store.rb in Puppet before 2.6.17 and 2.7.x before 2.7.18, and Puppet Enterprise before 2.5.2, when Delete is enabled in auth.conf,. A remote authenticated attacker can send a specially crafted HTTP request and remote authenticated users to delete arbitrary files on the puppet master server via a . (dot dot) in a node name.


2) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2012-3866)

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

lib/puppet/defaults.rb in Puppet 2.7.x before 2.7.18, and Puppet Enterprise before 2.5.2, uses 0644 permissions for last_run_report.yaml, which allows local users to obtain sensitive configuration information by leveraging access to the puppet master server to read this file.


Remediation

Install update from vendor's website.