Puppet 2.7.x before 2.7.5, 2.6.x before 2.6.11, and 0.25.x allows local users to modify the permissions of arbitrary files via a symlink attack on the SSH authorized_keys file.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Puppet | Puppet | 2.6.0 | 2.6.0 |
Puppet | Puppet | 2.6.1 | 2.6.1 |
Puppet | Puppet | 2.6.2 | 2.6.2 |
Puppet | Puppet | 2.6.3 | 2.6.3 |
Puppet | Puppet | 2.6.4 | 2.6.4 |
Puppet | Puppet | 2.6.5 | 2.6.5 |
Puppet | Puppet | 2.6.6 | 2.6.6 |
Puppet | Puppet | 2.6.7 | 2.6.7 |
Puppet | Puppet | 2.6.8 | 2.6.8 |
Puppet | Puppet | 2.6.9 | 2.6.9 |
Puppet | Puppet | 2.6.10 | 2.6.10 |
Puppet | Puppet | 2.7.2 | 2.7.2 |
Puppet | Puppet | 2.7.3 | 2.7.3 |
Puppet | Puppet | 2.7.4 | 2.7.4 |
Puppet | Puppetlabs | 2.7.0 | 2.7.0 |
Puppet | Puppetlabs | 2.7.1 | 2.7.1 |
Puppet | Ubuntu | devel | * |
Puppet | Ubuntu | lucid | * |
Puppet | Ubuntu | maverick | * |
Puppet | Ubuntu | natty | * |
Puppet | Ubuntu | upstream | * |