Puppet 2.7.x before 2.7.5, 2.6.x before 2.6.11, and 0.25.x, when running in --edit mode, uses a predictable file name, which allows local users to run arbitrary Puppet code or trick a user into editing arbitrary files.
Advisories
Source ID Title
Debian DSA Debian DSA DSA-2314-1 puppet security update
EUVD EUVD EUVD-2022-4604 Puppet 2.7.x before 2.7.5, 2.6.x before 2.6.11, and 0.25.x, when running in --edit mode, uses a predictable file name, which allows local users to run arbitrary Puppet code or trick a user into editing arbitrary files.
Github GHSA Github GHSA GHSA-mpmx-gm5v-q789 Puppet uses predictable filenames, allowing arbitrary file overwrite
Ubuntu USN Ubuntu USN USN-1223-1 Puppet vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-06T23:53:31.193Z

Reserved: 2011-09-29T00:00:00

Link: CVE-2011-3871

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2011-10-27T20:55:01.620

Modified: 2025-04-11T00:51:21.963

Link: CVE-2011-3871

cve-icon Redhat

Severity : Moderate

Publid Date: 2011-09-30T00:00:00Z

Links: CVE-2011-3871 - Bugzilla

cve-icon OpenCVE Enrichment

No data.