Vulnerability Details CVE-2016-3111
pulp.spec in the installation process for Pulp 2.8.3 generates the RSA key pairs used to validate messages between the pulp server and pulp consumers in a directory that is world-readable before later modifying the permissions, which might allow local users to read the generated RSA keys via reading the key files while the installation process is running.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 14.7%
CVSS Severity
CVSS v3 Score 5.5
CVSS v2 Score 2.1
Products affected by CVE-2016-3111
-
cpe:2.3:a:pulpproject:pulp:2.2.1-1
-
cpe:2.3:a:pulpproject:pulp:2.4.0
-
cpe:2.3:a:pulpproject:pulp:2.4.1
-
cpe:2.3:a:pulpproject:pulp:2.4.2
-
cpe:2.3:a:pulpproject:pulp:2.4.3
-
cpe:2.3:a:pulpproject:pulp:2.4.4
-
cpe:2.3:a:pulpproject:pulp:2.5.0
-
cpe:2.3:a:pulpproject:pulp:2.5.1
-
cpe:2.3:a:pulpproject:pulp:2.5.2
-
cpe:2.3:a:pulpproject:pulp:2.5.3
-
cpe:2.3:a:pulpproject:pulp:2.6.0
-
cpe:2.3:a:pulpproject:pulp:2.6.1
-
cpe:2.3:a:pulpproject:pulp:2.6.2
-
cpe:2.3:a:pulpproject:pulp:2.6.3
-
cpe:2.3:a:pulpproject:pulp:2.6.4
-
cpe:2.3:a:pulpproject:pulp:2.6.5
-
cpe:2.3:a:pulpproject:pulp:2.7.0
-
cpe:2.3:a:pulpproject:pulp:2.8.0
-
cpe:2.3:a:pulpproject:pulp:2.8.1
-
cpe:2.3:a:pulpproject:pulp:2.8.2
-
cpe:2.3:a:pulpproject:pulp:2.8.2-1