Vulnerability Details CVE-2012-3865
Directory traversal vulnerability in lib/puppet/reports/store.rb in Puppet before 2.6.17 and 2.7.x before 2.7.18, and Puppet Enterprise before 2.5.2, when Delete is enabled in auth.conf, allows remote authenticated users to delete arbitrary files on the puppet master server via a .. (dot dot) in a node name.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.021
EPSS Ranking 83.5%
CVSS Severity
CVSS v2 Score 3.5
Products affected by CVE-2012-3865
-
cpe:2.3:a:puppet:puppet:2.6.0
-
cpe:2.3:a:puppet:puppet:2.6.1
-
cpe:2.3:a:puppet:puppet:2.6.10
-
cpe:2.3:a:puppet:puppet:2.6.11
-
cpe:2.3:a:puppet:puppet:2.6.12
-
cpe:2.3:a:puppet:puppet:2.6.13
-
cpe:2.3:a:puppet:puppet:2.6.14
-
cpe:2.3:a:puppet:puppet:2.6.15
-
cpe:2.3:a:puppet:puppet:2.6.2
-
cpe:2.3:a:puppet:puppet:2.6.3
-
cpe:2.3:a:puppet:puppet:2.6.4
-
cpe:2.3:a:puppet:puppet:2.6.5
-
cpe:2.3:a:puppet:puppet:2.6.6
-
cpe:2.3:a:puppet:puppet:2.6.7
-
cpe:2.3:a:puppet:puppet:2.6.8
-
cpe:2.3:a:puppet:puppet:2.6.9
-
cpe:2.3:a:puppet:puppet:2.7.10
-
cpe:2.3:a:puppet:puppet:2.7.11
-
cpe:2.3:a:puppet:puppet:2.7.12
-
cpe:2.3:a:puppet:puppet:2.7.13
-
cpe:2.3:a:puppet:puppet:2.7.14
-
cpe:2.3:a:puppet:puppet:2.7.16
-
cpe:2.3:a:puppet:puppet:2.7.2
-
cpe:2.3:a:puppet:puppet:2.7.3
-
cpe:2.3:a:puppet:puppet:2.7.4
-
cpe:2.3:a:puppet:puppet:2.7.5
-
cpe:2.3:a:puppet:puppet:2.7.6
-
cpe:2.3:a:puppet:puppet:2.7.8
-
cpe:2.3:a:puppet:puppet:2.7.9
-
cpe:2.3:a:puppet:puppet_enterprise:-
-
cpe:2.3:a:puppet:puppet_enterprise:1.0
-
cpe:2.3:a:puppet:puppet_enterprise:1.1
-
cpe:2.3:a:puppet:puppet_enterprise:1.2.0
-
cpe:2.3:a:puppet:puppet_enterprise:1.2.1
-
cpe:2.3:a:puppet:puppet_enterprise:1.2.2
-
cpe:2.3:a:puppet:puppet_enterprise:1.2.3
-
cpe:2.3:a:puppet:puppet_enterprise:1.2.4
-
cpe:2.3:a:puppet:puppet_enterprise:1.2.5
-
cpe:2.3:a:puppet:puppet_enterprise:1.2.6
-
cpe:2.3:a:puppet:puppet_enterprise:1.2.7
-
cpe:2.3:a:puppet:puppet_enterprise:2.0.0
-
cpe:2.3:a:puppet:puppet_enterprise:2.0.1
-
cpe:2.3:a:puppet:puppet_enterprise:2.0.2
-
cpe:2.3:a:puppet:puppet_enterprise:2.0.3
-
cpe:2.3:a:puppet:puppet_enterprise:2.5.0
-
cpe:2.3:a:puppet:puppet_enterprise:2.5.1
-
cpe:2.3:a:puppetlabs:puppet:0.25.0
-
cpe:2.3:a:puppetlabs:puppet:0.25.1
-
cpe:2.3:a:puppetlabs:puppet:0.25.2
-
cpe:2.3:a:puppetlabs:puppet:0.25.3
-
cpe:2.3:a:puppetlabs:puppet:0.25.4
-
cpe:2.3:a:puppetlabs:puppet:0.25.5
-
cpe:2.3:a:puppetlabs:puppet:0.25.6
-
cpe:2.3:a:puppetlabs:puppet:1.0
-
cpe:2.3:a:puppetlabs:puppet:1.1
-
cpe:2.3:a:puppetlabs:puppet:1.2
-
cpe:2.3:a:puppetlabs:puppet:2.0.0
-
cpe:2.3:a:puppetlabs:puppet:2.0.1
-
cpe:2.3:a:puppetlabs:puppet:2.0.2
-
cpe:2.3:a:puppetlabs:puppet:2.0.3
-
cpe:2.3:a:puppetlabs:puppet:2.5.1
-
cpe:2.3:a:puppetlabs:puppet:2.5.2
-
cpe:2.3:a:puppetlabs:puppet:2.6.0
-
cpe:2.3:a:puppetlabs:puppet:2.6.1
-
cpe:2.3:a:puppetlabs:puppet:2.6.10
-
cpe:2.3:a:puppetlabs:puppet:2.6.11
-
cpe:2.3:a:puppetlabs:puppet:2.6.12
-
cpe:2.3:a:puppetlabs:puppet:2.6.13
-
cpe:2.3:a:puppetlabs:puppet:2.6.14
-
cpe:2.3:a:puppetlabs:puppet:2.6.15
-
cpe:2.3:a:puppetlabs:puppet:2.6.16
-
cpe:2.3:a:puppetlabs:puppet:2.6.2
-
cpe:2.3:a:puppetlabs:puppet:2.6.3
-
cpe:2.3:a:puppetlabs:puppet:2.6.4
-
cpe:2.3:a:puppetlabs:puppet:2.6.5
-
cpe:2.3:a:puppetlabs:puppet:2.6.6
-
cpe:2.3:a:puppetlabs:puppet:2.6.7
-
cpe:2.3:a:puppetlabs:puppet:2.6.8
-
cpe:2.3:a:puppetlabs:puppet:2.6.9
-
cpe:2.3:a:puppetlabs:puppet:2.7.0
-
cpe:2.3:a:puppetlabs:puppet:2.7.1
-
cpe:2.3:a:puppetlabs:puppet:2.7.10
-
cpe:2.3:a:puppetlabs:puppet:2.7.11
-
cpe:2.3:a:puppetlabs:puppet:2.7.12
-
cpe:2.3:a:puppetlabs:puppet:2.7.13
-
cpe:2.3:a:puppetlabs:puppet:2.7.14
-
cpe:2.3:a:puppetlabs:puppet:2.7.16
-
cpe:2.3:a:puppetlabs:puppet:2.7.17
-
cpe:2.3:a:puppetlabs:puppet:2.7.2
-
cpe:2.3:a:puppetlabs:puppet:2.7.3
-
cpe:2.3:a:puppetlabs:puppet:2.7.4
-
cpe:2.3:a:puppetlabs:puppet:2.7.5
-
cpe:2.3:a:puppetlabs:puppet:2.7.6
-
cpe:2.3:a:puppetlabs:puppet:2.7.7
-
cpe:2.3:a:puppetlabs:puppet:2.7.8
-
cpe:2.3:a:puppetlabs:puppet:2.7.9