mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
138 lines
4.3 KiB
JSON
138 lines
4.3 KiB
JSON
{
|
|
"CVE_data_meta" : {
|
|
"ASSIGNER" : "cve@mitre.org",
|
|
"ID" : "CVE-2012-1986",
|
|
"STATE" : "PUBLIC"
|
|
},
|
|
"affects" : {
|
|
"vendor" : {
|
|
"vendor_data" : [
|
|
{
|
|
"product" : {
|
|
"product_data" : [
|
|
{
|
|
"product_name" : "n/a",
|
|
"version" : {
|
|
"version_data" : [
|
|
{
|
|
"version_value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format" : "MITRE",
|
|
"data_type" : "CVE",
|
|
"data_version" : "4.0",
|
|
"description" : {
|
|
"description_data" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "Puppet 2.6.x before 2.6.15 and 2.7.x before 2.7.13, and Puppet Enterprise (PE) Users 1.0, 1.1, 1.2.x, 2.0.x, and 2.5.x before 2.5.1 allows remote authenticated users with an authorized SSL key and certain permissions on the puppet master to read arbitrary files via a symlink attack in conjunction with a crafted REST request for a file in a filebucket."
|
|
}
|
|
]
|
|
},
|
|
"problemtype" : {
|
|
"problemtype_data" : [
|
|
{
|
|
"description" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references" : {
|
|
"reference_data" : [
|
|
{
|
|
"name" : "http://projects.puppetlabs.com/issues/13511",
|
|
"refsource" : "MISC",
|
|
"url" : "http://projects.puppetlabs.com/issues/13511"
|
|
},
|
|
{
|
|
"name" : "http://projects.puppetlabs.com/projects/1/wiki/Release_Notes#2.6.15",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://projects.puppetlabs.com/projects/1/wiki/Release_Notes#2.6.15"
|
|
},
|
|
{
|
|
"name" : "http://puppetlabs.com/security/cve/cve-2012-1986/",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://puppetlabs.com/security/cve/cve-2012-1986/"
|
|
},
|
|
{
|
|
"name" : "DSA-2451",
|
|
"refsource" : "DEBIAN",
|
|
"url" : "http://www.debian.org/security/2012/dsa-2451"
|
|
},
|
|
{
|
|
"name" : "FEDORA-2012-5999",
|
|
"refsource" : "FEDORA",
|
|
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079227.html"
|
|
},
|
|
{
|
|
"name" : "FEDORA-2012-6055",
|
|
"refsource" : "FEDORA",
|
|
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079289.html"
|
|
},
|
|
{
|
|
"name" : "FEDORA-2012-6674",
|
|
"refsource" : "FEDORA",
|
|
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080003.html"
|
|
},
|
|
{
|
|
"name" : "openSUSE-SU-2012:0608",
|
|
"refsource" : "SUSE",
|
|
"url" : "https://hermes.opensuse.org/messages/14523305"
|
|
},
|
|
{
|
|
"name" : "openSUSE-SU-2012:0835",
|
|
"refsource" : "SUSE",
|
|
"url" : "https://hermes.opensuse.org/messages/15087408"
|
|
},
|
|
{
|
|
"name" : "USN-1419-1",
|
|
"refsource" : "UBUNTU",
|
|
"url" : "http://ubuntu.com/usn/usn-1419-1"
|
|
},
|
|
{
|
|
"name" : "52975",
|
|
"refsource" : "BID",
|
|
"url" : "http://www.securityfocus.com/bid/52975"
|
|
},
|
|
{
|
|
"name" : "48743",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/48743"
|
|
},
|
|
{
|
|
"name" : "48748",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/48748"
|
|
},
|
|
{
|
|
"name" : "48789",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/48789"
|
|
},
|
|
{
|
|
"name" : "49136",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/49136"
|
|
},
|
|
{
|
|
"name" : "puppet-rest-symlink(74794)",
|
|
"refsource" : "XF",
|
|
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/74794"
|
|
}
|
|
]
|
|
}
|
|
}
|