Skip to content

Puppet uses predictable filenames, allowing arbitrary file overwrite

Moderate severity GitHub Reviewed Published May 14, 2022 to the GitHub Advisory Database • Updated Sep 18, 2023

Package

bundler puppet (RubyGems)

Affected versions

>= 2.6, < 2.6.15
>= 2.7, < 2.7.13

Patched versions

2.6.15
2.7.13

Description

Puppet 2.6.x before 2.6.15 and 2.7.x before 2.7.13, and Puppet Enterprise (PE) Users 1.0, 1.1, 1.2.x, 2.0.x, and 2.5.x before 2.5.1 uses predictable file names when installing Mac OS X packages from a remote source, which allows local users to overwrite arbitrary files or install arbitrary packages via a symlink attack on a temporary file in /tmp.

References

Published by the National Vulnerability Database May 29, 2012
Published to the GitHub Advisory Database May 14, 2022
Reviewed Aug 29, 2023
Last updated Sep 18, 2023

Severity

Moderate

EPSS score

0.042%
(5th percentile)

Weaknesses

CVE ID

CVE-2012-1906

GHSA ID

GHSA-c4mc-49hq-q275

Source code

No known source code
Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.