CVE-2010-0156: Puppet arbitrary files overwrite via a symlink attack
3.3
CVSS Score
Basic Information
CVE ID
GHSA ID
EPSS Score
0.12103%
CWE
Published
5/2/2022
Updated
2/7/2024
KEV Status
No
Technology
Ruby
Technical Details
CVSS Vector
AV:L/AC:M/Au:N/C:N/I:P/A:P
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
puppet | rubygems | >= 0.24.0, < 0.24.9 | 0.24.9 |
puppet | rubygems | >= 0.25.0, < 0.25.2 | 0.25.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from using File.open
with predictable temporary file paths without proper symlink checks. The patch replaced these calls with Puppet::Util.secure_open
which adds symlink validation, deletion of existing files/symlinks, and atomic file creation. The affected functions were clearly identified in the commit diffs modifying daemon.rb
and reference.rb
. High confidence comes from direct evidence in patch changes and CVE description matching the file operations.