2017-10-16 12:31:07 -04:00
{
2019-03-18 03:40:56 +00:00
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org" ,
"ID" : "CVE-2012-1986" ,
"STATE" : "PUBLIC"
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a" ,
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
} ,
"vendor_name" : "n/a"
}
2017-10-16 12:31:07 -04:00
]
2019-03-18 03:40:56 +00:00
}
} ,
"data_format" : "MITRE" ,
"data_type" : "CVE" ,
"data_version" : "4.0" ,
"description" : {
"description_data" : [
{
"lang" : "eng" ,
"value" : "Puppet 2.6.x before 2.6.15 and 2.7.x before 2.7.13, and Puppet Enterprise (PE) Users 1.0, 1.1, 1.2.x, 2.0.x, and 2.5.x before 2.5.1 allows remote authenticated users with an authorized SSL key and certain permissions on the puppet master to read arbitrary files via a symlink attack in conjunction with a crafted REST request for a file in a filebucket."
}
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "n/a"
}
]
}
]
} ,
"references" : {
"reference_data" : [
{
"name" : "USN-1419-1" ,
"refsource" : "UBUNTU" ,
"url" : "http://ubuntu.com/usn/usn-1419-1"
} ,
{
"name" : "FEDORA-2012-5999" ,
"refsource" : "FEDORA" ,
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079227.html"
} ,
{
"name" : "http://puppetlabs.com/security/cve/cve-2012-1986/" ,
"refsource" : "CONFIRM" ,
"url" : "http://puppetlabs.com/security/cve/cve-2012-1986/"
} ,
{
"name" : "openSUSE-SU-2012:0608" ,
"refsource" : "SUSE" ,
"url" : "https://hermes.opensuse.org/messages/14523305"
} ,
{
"name" : "puppet-rest-symlink(74794)" ,
"refsource" : "XF" ,
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/74794"
} ,
{
"name" : "48743" ,
"refsource" : "SECUNIA" ,
"url" : "http://secunia.com/advisories/48743"
} ,
{
"name" : "http://projects.puppetlabs.com/projects/1/wiki/Release_Notes#2.6.15" ,
"refsource" : "CONFIRM" ,
"url" : "http://projects.puppetlabs.com/projects/1/wiki/Release_Notes#2.6.15"
} ,
{
"name" : "FEDORA-2012-6055" ,
"refsource" : "FEDORA" ,
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079289.html"
} ,
{
"name" : "FEDORA-2012-6674" ,
"refsource" : "FEDORA" ,
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080003.html"
} ,
{
"name" : "http://projects.puppetlabs.com/issues/13511" ,
"refsource" : "MISC" ,
"url" : "http://projects.puppetlabs.com/issues/13511"
} ,
{
"name" : "49136" ,
"refsource" : "SECUNIA" ,
"url" : "http://secunia.com/advisories/49136"
} ,
{
"name" : "52975" ,
"refsource" : "BID" ,
"url" : "http://www.securityfocus.com/bid/52975"
} ,
{
"name" : "48748" ,
"refsource" : "SECUNIA" ,
"url" : "http://secunia.com/advisories/48748"
} ,
{
"name" : "DSA-2451" ,
"refsource" : "DEBIAN" ,
"url" : "http://www.debian.org/security/2012/dsa-2451"
} ,
{
"name" : "openSUSE-SU-2012:0835" ,
"refsource" : "SUSE" ,
"url" : "https://hermes.opensuse.org/messages/15087408"
} ,
{
"name" : "48789" ,
"refsource" : "SECUNIA" ,
"url" : "http://secunia.com/advisories/48789"
}
]
}
}