Puppet uses predictable filenames, allowing arbitrary file overwrite
Moderate severity
GitHub Reviewed
Published
May 14, 2022
to the GitHub Advisory Database
•
Updated Jan 19, 2024
Package
Affected versions
< 2.6.11
>= 2.7.0, < 2.7.5
Patched versions
2.6.11
2.7.5
Description
Published by the National Vulnerability Database
Oct 27, 2011
Published to the GitHub Advisory Database
May 14, 2022
Reviewed
Jan 16, 2024
Last updated
Jan 19, 2024
Puppet 2.7.x before 2.7.5, 2.6.x before 2.6.11, and 0.25.x, when running in
--edit
mode, uses a predictable file name, which allows local users to run arbitrary Puppet code or trick a user into editing arbitrary files.References