CVE-2012-1988

Puppet 2.6.x before 2.6.15 and 2.7.x before 2.7.13, and Puppet Enterprise (PE) Users 1.0, 1.1, 1.2.x, 2.0.x, and 2.5.x before 2.5.1 allows remote authenticated users with agent SSL keys and file-creation permissions on the puppet master to execute arbitrary commands by creating a file whose full pathname contains shell metacharacters, then performing a filebucket request.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:puppet:puppet:*:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:puppet:puppet_enterprise:*:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet_enterprise:1.0:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet_enterprise:1.1:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:fedoraproject:fedora:15:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*

History

02 Feb 2024, 15:14

Type Values Removed Values Added
References () http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079227.html - () http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079227.html - Mailing List, Third Party Advisory
References () http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079289.html - () http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079289.html - Mailing List, Third Party Advisory
References () http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080003.html - () http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080003.html - Mailing List, Third Party Advisory
References () http://projects.puppetlabs.com/issues/13518 - Vendor Advisory () http://projects.puppetlabs.com/issues/13518 - Broken Link, Vendor Advisory
References () http://projects.puppetlabs.com/projects/1/wiki/Release_Notes#2.6.15 - () http://projects.puppetlabs.com/projects/1/wiki/Release_Notes#2.6.15 - Broken Link
References () http://puppetlabs.com/security/cve/cve-2012-1988/ - Vendor Advisory () http://puppetlabs.com/security/cve/cve-2012-1988/ - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/48743 - Vendor Advisory () http://secunia.com/advisories/48743 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/48748 - Vendor Advisory () http://secunia.com/advisories/48748 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/48789 - Vendor Advisory () http://secunia.com/advisories/48789 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/49136 - Vendor Advisory () http://secunia.com/advisories/49136 - Broken Link, Vendor Advisory
References () http://ubuntu.com/usn/usn-1419-1 - () http://ubuntu.com/usn/usn-1419-1 - Third Party Advisory
References () http://www.debian.org/security/2012/dsa-2451 - () http://www.debian.org/security/2012/dsa-2451 - Third Party Advisory
References () http://www.osvdb.org/81309 - () http://www.osvdb.org/81309 - Broken Link
References () http://www.securityfocus.com/bid/52975 - () http://www.securityfocus.com/bid/52975 - Broken Link, Third Party Advisory, VDB Entry
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/74796 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/74796 - Third Party Advisory, VDB Entry
References () https://hermes.opensuse.org/messages/14523305 - () https://hermes.opensuse.org/messages/14523305 - Broken Link
References () https://hermes.opensuse.org/messages/15087408 - () https://hermes.opensuse.org/messages/15087408 - Broken Link
CPE cpe:2.3:a:puppet:puppet:2.6.10:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.6.14:*:*:*:*:*:*:*
cpe:2.3:a:puppetlabs:puppet:2.7.1:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.7.3:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.6.1:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.7.6:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.6.0:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.7.5:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.7.9:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet_enterprise:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.6.12:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.6.9:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.6.2:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.6.13:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.7.8:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet_enterprise:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.6.4:*:*:*:*:*:*:*
cpe:2.3:a:puppetlabs:puppet_enterprise_users:1.0:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.6.6:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet_enterprise:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.6.11:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet_enterprise:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.6.3:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.7.10:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.7.2:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet_enterprise:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.6.7:*:*:*:*:*:*:*
cpe:2.3:a:puppetlabs:puppet:2.7.0:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet_enterprise:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.7.11:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet_enterprise:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.6.8:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.7.7:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet_enterprise:1.2.4:*:*:*:*:*:*:*
cpe:2.3:a:puppetlabs:puppet_enterprise_users:1.1:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.6.5:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet_enterprise:2.5.0:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.7.4:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:*:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet_enterprise:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet_enterprise:1.1:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:15:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet_enterprise:1.0:*:*:*:*:*:*:*
First Time Debian
Canonical
Fedoraproject fedora
Debian debian Linux
Fedoraproject
Canonical ubuntu Linux
CWE CWE-77 CWE-78

Information

Published : 2012-05-29 20:55

Updated : 2024-02-02 15:14


NVD link : CVE-2012-1988

Mitre link : CVE-2012-1988

CVE.ORG link : CVE-2012-1988


JSON object : View

Products Affected

puppet

  • puppet
  • puppet_enterprise

debian

  • debian_linux

canonical

  • ubuntu_linux

fedoraproject

  • fedora
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')