-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| puppet | rubygems | < 2.6.11 | 2.6.11 |
| puppet | rubygems | >= 2.7.0, < 2.7.5 | 2.7.5 |
The vulnerability stems from Puppet performing privileged filesystem operations (mkdir/chown) on user-controlled paths before dropping root privileges. The commit 88512e8 shows these operations were moved into a SUIDManager.asuser block to execute with reduced privileges. The original code's File.chown(uid, nil, dir) and File.chown(uid, nil, target) calls (executed as root) allowed attackers to replace the target paths with symlinks during the TOCTOU window, modifying arbitrary file permissions. The test suite changes (removing chown expectations) confirm these were the vulnerable operations.
A Semantic Attack on Google Gemini - Read the Latest Research