Skip to content

Puppet Denial of Service and Arbitrary File Write

Low severity GitHub Reviewed Published May 14, 2022 to the GitHub Advisory Database • Updated Jan 15, 2024

Package

bundler puppet (RubyGems)

Affected versions

>= 2.6.0, < 2.6.15
>= 2.7.0, < 2.7.13

Patched versions

2.6.15
2.7.13

Description

A vulnerability in Puppet 2.6.x before 2.6.15 and 2.7.x before 2.7.13, and Puppet Enterprise (PE) Users 1.0, 1.1, 1.2.x, 2.0.x, and 2.5.x before 2.5.1 allows remote authenticated users with agent SSL keys to (1) cause a denial of service (memory consumption) via a REST request to a stream that triggers a thread block, as demonstrated using CVE-2012-1986 and /dev/random; or (2) cause a denial of service (filesystem consumption) via crafted REST requests that use "a marshaled form of a Puppet::FileBucket::File object" to write to arbitrary file locations.

References

Published by the National Vulnerability Database May 29, 2012
Published to the GitHub Advisory Database May 14, 2022
Reviewed Jan 12, 2024
Last updated Jan 15, 2024

Severity

Low

EPSS score

1.243%
(86th percentile)

Weaknesses

CVE ID

CVE-2012-1987

GHSA ID

GHSA-v58w-6xc2-w799

Source code

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.