Moderate

CVE-2011-3870 - Link Following vulnerability in Puppetlabs Puppet

Publication: 2011-10-27
Summary

Puppet 2.7.x before 2.7.5, 2.6.x before 2.6.11, and 0.25.x allows local users to modify the permissions of arbitrary files via a symlink attack on the SSH authorized_keys file.

Classification
CWE-59: Link Following

Risk level (CVSS 6.3)

Moderate

6.3

Access Vector

  • Network
  • Adjacent Network
  • Local

Access Complexity

  • Low
  • Medium
  • High

Authentication

  • None
  • Single
  • Multiple

Confident. Impact

  • Complete
  • Partial
  • None

Integrity Impact

  • Complete
  • Partial
  • None

Affected Products

  • Puppetlabs Puppet 0.25.0
  • Puppetlabs Puppet 0.25.1
  • Puppetlabs Puppet 0.25.2
  • Puppetlabs Puppet 0.25.3
  • Puppetlabs Puppet 0.25.4
  • Puppetlabs Puppet 0.25.5
  • Puppetlabs Puppet 0.25.6
  • Puppetlabs Puppet 2.6.0
  • Puppetlabs Puppet 2.6.1
  • Puppetlabs Puppet 2.6.2
  • Puppetlabs Puppet 2.6.3
  • Puppetlabs Puppet 2.6.4
  • Puppetlabs Puppet 2.6.5
  • Puppetlabs Puppet 2.6.6
  • Puppetlabs Puppet 2.6.7
  • Puppetlabs Puppet 2.6.8
  • Puppetlabs Puppet 2.6.9
  • Puppetlabs Puppet 2.6.10
  • Puppetlabs Puppet 2.7.0
  • Puppetlabs Puppet 2.7.1
  • Puppetlabs Puppet 2.7.2
  • Puppetlabs Puppet 2.7.3
  • Puppetlabs Puppet 2.7.4