CVE-2012-1987:
Puppet Denial of Service and Arbitrary File Write
3.5
CVSS Score
Basic Information
CVE ID
GHSA ID
EPSS Score
0.71858%
CWE
Published
5/14/2022
Updated
1/15/2024
KEV Status
No
Technology
Ruby
Technical Details
CVSS Vector
AV:N/AC:M/Au:S/C:N/I:N/A:P
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
puppet | rubygems | >= 2.6.0, < 2.6.15 | 2.6.15 |
puppet | rubygems | >= 2.7.0, < 2.7.13 | 2.7.13 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The GitHub patch explicitly removes the 'bucket_path' parameter in the uri2indirection
function (lib/puppet/network/http/api/v1.rb
), which was previously passed through from user input. The commit message and tests confirm this parameter was the attack vector for arbitrary file writes. The memory consumption DoS (via /dev/random
) is likely related to filebucket
path handling but lacks explicit function references in the provided data. The primary vulnerable function is clearly identified by the patch.