GHSA-8jxj-9r5f-w3m2

Suggest an improvement
Source
https://github.com/advisories/GHSA-8jxj-9r5f-w3m2
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2017/10/GHSA-8jxj-9r5f-w3m2/GHSA-8jxj-9r5f-w3m2.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-8jxj-9r5f-w3m2
Aliases
Published
2017-10-24T18:33:37Z
Modified
2024-11-29T05:38:59.601360Z
Summary
Puppet allows local users to obtain sensitive configuration information
Details

lib/puppet/defaults.rb in Puppet 2.7.x before 2.7.18, and Puppet Enterprise before 2.5.2, uses 0644 permissions for last_run_report.yaml, which allows local users to obtain sensitive configuration information by leveraging access to the puppet master server to read this file.

Database specific
{
    "nvd_published_at": "2012-08-06T16:55:06Z",
    "cwe_ids": [],
    "severity": "LOW",
    "github_reviewed": true,
    "github_reviewed_at": "2020-06-16T21:25:49Z"
}
References

Affected packages

RubyGems / puppet

Package

Name
puppet
Purl
pkg:gem/puppet

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.7.0
Fixed
2.7.18

Affected versions

2.*

2.7.1
2.7.3
2.7.4
2.7.5
2.7.6
2.7.8
2.7.9
2.7.11
2.7.12
2.7.13
2.7.14
2.7.16
2.7.17