Vulnerabilities > Puppet

DATE CVE VULNERABILITY TITLE RISK
2011-10-27 CVE-2011-3872 Improper Input Validation vulnerability in multiple products
Puppet 2.6.x before 2.6.12 and 2.7.x before 2.7.6, and Puppet Enterprise (PE) Users 1.0, 1.1, and 1.2 before 1.2.4, when signing an agent certificate, adds the Puppet master's certdnsnames values to the X.509 Subject Alternative Name field of the certificate, which allows remote attackers to spoof a Puppet master via a man-in-the-middle (MITM) attack against an agent that uses an alternate DNS name for the master, aka "AltNames Vulnerability."
network
high complexity
puppet puppetlabs CWE-20
2.6
2011-10-27 CVE-2011-3871 Permissions, Privileges, and Access Controls vulnerability in multiple products
Puppet 2.7.x before 2.7.5, 2.6.x before 2.6.11, and 0.25.x, when running in --edit mode, uses a predictable file name, which allows local users to run arbitrary Puppet code or trick a user into editing arbitrary files.
local
high complexity
puppet puppetlabs CWE-264
6.2
2011-10-27 CVE-2011-3870 Link Following vulnerability in multiple products
Puppet 2.7.x before 2.7.5, 2.6.x before 2.6.11, and 0.25.x allows local users to modify the permissions of arbitrary files via a symlink attack on the SSH authorized_keys file.
6.3
2011-10-27 CVE-2011-3869 Link Following vulnerability in multiple products
Puppet 2.7.x before 2.7.5, 2.6.x before 2.6.11, and 0.25.x allows local users to overwrite arbitrary files via a symlink attack on the .k5login file.
6.3
2011-10-27 CVE-2011-3848 Path Traversal vulnerability in multiple products
Directory traversal vulnerability in Puppet 2.6.x before 2.6.10 and 2.7.x before 2.7.4 allows remote attackers to write X.509 Certificate Signing Request (CSR) to arbitrary locations via (1) a double-encoded key parameter in the URI in 2.7.x, (2) the CN in the Subject of a CSR in 2.6 and 0.25.
network
low complexity
puppet puppetlabs CWE-22
5.0
2010-03-03 CVE-2010-0156 Link Following vulnerability in Puppet
Puppet 0.24.x before 0.24.9 and 0.25.x before 0.25.2 allows local users to overwrite arbitrary files via a symlink attack on the (1) /tmp/daemonout, (2) /tmp/puppetdoc.txt, (3) /tmp/puppetdoc.tex, or (4) /tmp/puppetdoc.aux temporary file.
local
puppet CWE-59
3.3