CVE-2012-1988

Puppet 2.6.x before 2.6.15 and 2.7.x before 2.7.13, and Puppet Enterprise (PE) Users 1.0, 1.1, 1.2.x, 2.0.x, and 2.5.x before 2.5.1 allows remote authenticated users with agent SSL keys and file-creation permissions on the puppet master to execute arbitrary commands by creating a file whose full pathname contains shell metacharacters, then performing a filebucket request.
References
Link Resource
http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079227.html Mailing List Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079289.html Mailing List Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080003.html Mailing List Third Party Advisory
http://projects.puppetlabs.com/issues/13518 Broken Link Vendor Advisory
http://projects.puppetlabs.com/projects/1/wiki/Release_Notes#2.6.15 Broken Link
http://puppetlabs.com/security/cve/cve-2012-1988/ Broken Link Vendor Advisory
http://secunia.com/advisories/48743 Broken Link Vendor Advisory
http://secunia.com/advisories/48748 Broken Link Vendor Advisory
http://secunia.com/advisories/48789 Broken Link Vendor Advisory
http://secunia.com/advisories/49136 Broken Link Vendor Advisory
http://ubuntu.com/usn/usn-1419-1 Third Party Advisory
http://www.debian.org/security/2012/dsa-2451 Third Party Advisory
http://www.osvdb.org/81309 Broken Link
http://www.securityfocus.com/bid/52975 Broken Link Third Party Advisory VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/74796 Third Party Advisory VDB Entry
https://hermes.opensuse.org/messages/14523305 Broken Link
https://hermes.opensuse.org/messages/15087408 Broken Link
http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079227.html Mailing List Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079289.html Mailing List Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080003.html Mailing List Third Party Advisory
http://projects.puppetlabs.com/issues/13518 Broken Link Vendor Advisory
http://projects.puppetlabs.com/projects/1/wiki/Release_Notes#2.6.15 Broken Link
http://puppetlabs.com/security/cve/cve-2012-1988/ Broken Link Vendor Advisory
http://secunia.com/advisories/48743 Broken Link Vendor Advisory
http://secunia.com/advisories/48748 Broken Link Vendor Advisory
http://secunia.com/advisories/48789 Broken Link Vendor Advisory
http://secunia.com/advisories/49136 Broken Link Vendor Advisory
http://ubuntu.com/usn/usn-1419-1 Third Party Advisory
http://www.debian.org/security/2012/dsa-2451 Third Party Advisory
http://www.osvdb.org/81309 Broken Link
http://www.securityfocus.com/bid/52975 Broken Link Third Party Advisory VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/74796 Third Party Advisory VDB Entry
https://hermes.opensuse.org/messages/14523305 Broken Link
https://hermes.opensuse.org/messages/15087408 Broken Link
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:puppet:puppet:*:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:puppet:puppet_enterprise:*:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet_enterprise:1.0:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet_enterprise:1.1:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:fedoraproject:fedora:15:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*

History

21 Nov 2024, 01:38

Type Values Removed Values Added
References () http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079227.html - Mailing List, Third Party Advisory () http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079227.html - Mailing List, Third Party Advisory
References () http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079289.html - Mailing List, Third Party Advisory () http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079289.html - Mailing List, Third Party Advisory
References () http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080003.html - Mailing List, Third Party Advisory () http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080003.html - Mailing List, Third Party Advisory
References () http://projects.puppetlabs.com/issues/13518 - Broken Link, Vendor Advisory () http://projects.puppetlabs.com/issues/13518 - Broken Link, Vendor Advisory
References () http://projects.puppetlabs.com/projects/1/wiki/Release_Notes#2.6.15 - Broken Link () http://projects.puppetlabs.com/projects/1/wiki/Release_Notes#2.6.15 - Broken Link
References () http://puppetlabs.com/security/cve/cve-2012-1988/ - Broken Link, Vendor Advisory () http://puppetlabs.com/security/cve/cve-2012-1988/ - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/48743 - Broken Link, Vendor Advisory () http://secunia.com/advisories/48743 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/48748 - Broken Link, Vendor Advisory () http://secunia.com/advisories/48748 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/48789 - Broken Link, Vendor Advisory () http://secunia.com/advisories/48789 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/49136 - Broken Link, Vendor Advisory () http://secunia.com/advisories/49136 - Broken Link, Vendor Advisory
References () http://ubuntu.com/usn/usn-1419-1 - Third Party Advisory () http://ubuntu.com/usn/usn-1419-1 - Third Party Advisory
References () http://www.debian.org/security/2012/dsa-2451 - Third Party Advisory () http://www.debian.org/security/2012/dsa-2451 - Third Party Advisory
References () http://www.osvdb.org/81309 - Broken Link () http://www.osvdb.org/81309 - Broken Link
References () http://www.securityfocus.com/bid/52975 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/52975 - Broken Link, Third Party Advisory, VDB Entry
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/74796 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/74796 - Third Party Advisory, VDB Entry
References () https://hermes.opensuse.org/messages/14523305 - Broken Link () https://hermes.opensuse.org/messages/14523305 - Broken Link
References () https://hermes.opensuse.org/messages/15087408 - Broken Link () https://hermes.opensuse.org/messages/15087408 - Broken Link

02 Feb 2024, 15:14

Type Values Removed Values Added
CPE cpe:2.3:a:puppet:puppet:2.7.2:*:*:*:*:*:*:*
cpe:2.3:a:puppetlabs:puppet_enterprise_users:1.0:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.6.5:*:*:*:*:*:*:*
cpe:2.3:a:puppetlabs:puppet:2.7.0:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.7.7:*:*:*:*:*:*:*
cpe:2.3:a:puppetlabs:puppet_enterprise_users:1.1:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.7.6:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet_enterprise:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.6.3:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.6.13:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet_enterprise:2.5.0:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.6.0:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.6.4:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.7.9:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet_enterprise:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.7.8:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.6.1:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet_enterprise:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.6.10:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.6.2:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.6.11:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.7.10:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.7.3:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.6.7:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.7.11:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.7.5:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.7.4:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet_enterprise:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.6.9:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.6.8:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.6.6:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.6.14:*:*:*:*:*:*:*
cpe:2.3:a:puppetlabs:puppet:2.7.1:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet_enterprise:1.2.4:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet_enterprise:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.6.12:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet_enterprise:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet_enterprise:2.0.2:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet_enterprise:1.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet_enterprise:1.1:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet_enterprise:*:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:15:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:*:*:*:*:*:*:*:*
CWE CWE-77 CWE-78
References (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/74796 - (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/74796 - Third Party Advisory, VDB Entry
References (UBUNTU) http://ubuntu.com/usn/usn-1419-1 - (UBUNTU) http://ubuntu.com/usn/usn-1419-1 - Third Party Advisory
References (FEDORA) http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079227.html - (FEDORA) http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079227.html - Mailing List, Third Party Advisory
References (MISC) http://projects.puppetlabs.com/issues/13518 - Vendor Advisory (MISC) http://projects.puppetlabs.com/issues/13518 - Broken Link, Vendor Advisory
References (CONFIRM) http://projects.puppetlabs.com/projects/1/wiki/Release_Notes#2.6.15 - (CONFIRM) http://projects.puppetlabs.com/projects/1/wiki/Release_Notes#2.6.15 - Broken Link
References (FEDORA) http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080003.html - (FEDORA) http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080003.html - Mailing List, Third Party Advisory
References (BID) http://www.securityfocus.com/bid/52975 - (BID) http://www.securityfocus.com/bid/52975 - Broken Link, Third Party Advisory, VDB Entry
References (CONFIRM) http://puppetlabs.com/security/cve/cve-2012-1988/ - Vendor Advisory (CONFIRM) http://puppetlabs.com/security/cve/cve-2012-1988/ - Broken Link, Vendor Advisory
References (SUSE) https://hermes.opensuse.org/messages/15087408 - (SUSE) https://hermes.opensuse.org/messages/15087408 - Broken Link
References (SECUNIA) http://secunia.com/advisories/48789 - Vendor Advisory (SECUNIA) http://secunia.com/advisories/48789 - Broken Link, Vendor Advisory
References (OSVDB) http://www.osvdb.org/81309 - (OSVDB) http://www.osvdb.org/81309 - Broken Link
References (FEDORA) http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079289.html - (FEDORA) http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079289.html - Mailing List, Third Party Advisory
References (SUSE) https://hermes.opensuse.org/messages/14523305 - (SUSE) https://hermes.opensuse.org/messages/14523305 - Broken Link
References (SECUNIA) http://secunia.com/advisories/49136 - Vendor Advisory (SECUNIA) http://secunia.com/advisories/49136 - Broken Link, Vendor Advisory
References (SECUNIA) http://secunia.com/advisories/48748 - Vendor Advisory (SECUNIA) http://secunia.com/advisories/48748 - Broken Link, Vendor Advisory
References (DEBIAN) http://www.debian.org/security/2012/dsa-2451 - (DEBIAN) http://www.debian.org/security/2012/dsa-2451 - Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/48743 - Vendor Advisory (SECUNIA) http://secunia.com/advisories/48743 - Broken Link, Vendor Advisory
First Time Canonical
Canonical ubuntu Linux
Debian debian Linux
Debian
Fedoraproject fedora
Fedoraproject

Information

Published : 2012-05-29 20:55

Updated : 2024-11-21 01:38


NVD link : CVE-2012-1988

Mitre link : CVE-2012-1988

CVE.ORG link : CVE-2012-1988


JSON object : View

Products Affected

canonical

  • ubuntu_linux

puppet

  • puppet
  • puppet_enterprise

debian

  • debian_linux

fedoraproject

  • fedora
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')