CVE-2012-1988

Puppet 2.6.x before 2.6.15 and 2.7.x before 2.7.13, and Puppet Enterprise (PE) Users 1.0, 1.1, 1.2.x, 2.0.x, and 2.5.x before 2.5.1 allows remote authenticated users with agent SSL keys and file-creation permissions on the puppet master to execute arbitrary commands by creating a file whose full pathname contains shell metacharacters, then performing a filebucket request.
References
Link Resource
http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079227.html Mailing List Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079289.html Mailing List Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080003.html Mailing List Third Party Advisory
http://projects.puppetlabs.com/issues/13518 Broken Link Vendor Advisory
http://projects.puppetlabs.com/projects/1/wiki/Release_Notes#2.6.15 Broken Link
http://puppetlabs.com/security/cve/cve-2012-1988/ Broken Link Vendor Advisory
http://secunia.com/advisories/48743 Broken Link Vendor Advisory
http://secunia.com/advisories/48748 Broken Link Vendor Advisory
http://secunia.com/advisories/48789 Broken Link Vendor Advisory
http://secunia.com/advisories/49136 Broken Link Vendor Advisory
http://ubuntu.com/usn/usn-1419-1 Third Party Advisory
http://www.debian.org/security/2012/dsa-2451 Third Party Advisory
http://www.osvdb.org/81309 Broken Link
http://www.securityfocus.com/bid/52975 Broken Link Third Party Advisory VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/74796 Third Party Advisory VDB Entry
https://hermes.opensuse.org/messages/14523305 Broken Link
https://hermes.opensuse.org/messages/15087408 Broken Link
http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079227.html Mailing List Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079289.html Mailing List Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080003.html Mailing List Third Party Advisory
http://projects.puppetlabs.com/issues/13518 Broken Link Vendor Advisory
http://projects.puppetlabs.com/projects/1/wiki/Release_Notes#2.6.15 Broken Link
http://puppetlabs.com/security/cve/cve-2012-1988/ Broken Link Vendor Advisory
http://secunia.com/advisories/48743 Broken Link Vendor Advisory
http://secunia.com/advisories/48748 Broken Link Vendor Advisory
http://secunia.com/advisories/48789 Broken Link Vendor Advisory
http://secunia.com/advisories/49136 Broken Link Vendor Advisory
http://ubuntu.com/usn/usn-1419-1 Third Party Advisory
http://www.debian.org/security/2012/dsa-2451 Third Party Advisory
http://www.osvdb.org/81309 Broken Link
http://www.securityfocus.com/bid/52975 Broken Link Third Party Advisory VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/74796 Third Party Advisory VDB Entry
https://hermes.opensuse.org/messages/14523305 Broken Link
https://hermes.opensuse.org/messages/15087408 Broken Link
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:puppet:puppet:*:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:puppet:puppet_enterprise:*:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet_enterprise:1.0:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet_enterprise:1.1:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:fedoraproject:fedora:15:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*

History

No history.

Information

Published : 2012-05-29 20:55

Updated : 2025-04-11 00:51


NVD link : CVE-2012-1988

Mitre link : CVE-2012-1988

CVE.ORG link : CVE-2012-1988


JSON object : View

Products Affected

debian

  • debian_linux

fedoraproject

  • fedora

puppet

  • puppet_enterprise
  • puppet

canonical

  • ubuntu_linux
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')