Directory traversal vulnerability in Puppet 2.6.x before 2.6.10 and 2.7.x before 2.7.4 allows remote attackers to write X.509 Certificate Signing Request (CSR) to arbitrary locations via (1) a double-encoded key parameter in the URI in 2.7.x, (2) the CN in the Subject of a CSR in 2.6 and 0.25.
Puppet is prone to a directory-traversal vulnerability because it fails to sufficiently sanitize user-supplied input.Remote attackers can use a specially crafted request with directory-traversal sequences to write arbitrary files with the privileges of the Puppet Master.
Updates are available. Please see the references for more information.
Attackers can exploit this issue with a Web browser.
|2011-10-27||CVE-2011-3869||Link Following vulnerability in Puppetlabs Puppet||Medium|
|2011-10-27||CVE-2011-3871||Permissions, Privileges, and Access Control vulnerability in Puppetlabs Puppet||Medium|
|2011-10-27||CVE-2011-3872||Input Validation vulnerability in Puppetlabs Puppet and Puppet Enterprise Users||Low|
|2011-10-27||CVE-2011-3870||Link Following vulnerability in Puppetlabs Puppet||Medium|