Puppet before 3.3.3 and 3.4 before 3.4.1 and Puppet Enterprise (PE) before 2.8.4 and 3.1 before 3.1.1 allows local users to overwrite arbitrary files via a symlink attack on unspecified files.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Puppet | Puppetlabs | 3.0.0 (including) | 3.3.2 (including) |
Puppet | Puppetlabs | 3.4.0 (including) | 3.4.1 (excluding) |
Puppet | Ubuntu | devel | * |
Puppet | Ubuntu | lucid | * |
Puppet | Ubuntu | precise | * |
Puppet | Ubuntu | quantal | * |
Puppet | Ubuntu | raring | * |
Puppet | Ubuntu | saucy | * |
Puppet | Ubuntu | upstream | * |