Puppet Denial of Service and Arbitrary File Write
Low severity
GitHub Reviewed
Published
May 14, 2022
to the GitHub Advisory Database
•
Updated Jan 15, 2024
Package
Affected versions
>= 2.6.0, < 2.6.15
>= 2.7.0, < 2.7.13
Patched versions
2.6.15
2.7.13
Description
Published by the National Vulnerability Database
May 29, 2012
Published to the GitHub Advisory Database
May 14, 2022
Reviewed
Jan 12, 2024
Last updated
Jan 15, 2024
A vulnerability in Puppet 2.6.x before 2.6.15 and 2.7.x before 2.7.13, and Puppet Enterprise (PE) Users 1.0, 1.1, 1.2.x, 2.0.x, and 2.5.x before 2.5.1 allows remote authenticated users with agent SSL keys to (1) cause a denial of service (memory consumption) via a REST request to a stream that triggers a thread block, as demonstrated using CVE-2012-1986 and
/dev/random
; or (2) cause a denial of service (filesystem consumption) via crafted REST requests that use "a marshaled form of aPuppet::FileBucket::File object
" to write to arbitrary file locations.References