Miggo Logo

CVE-2012-1988: Puppet Arbitrary Command Execution

6

CVSS Score

Basic Information

EPSS Score
0.64679%
Published
5/14/2022
Updated
2/6/2024
KEV Status
No
Technology
TechnologyRuby

Technical Details

CVSS Vector
AV:N/AC:M/Au:S/C:P/I:P/A:P
Package NameEcosystemVulnerable VersionsFirst Patched Version
puppetrubygems>= 2.6.0, < 2.6.152.6.15
puppetrubygems>= 2.7.0, < 2.7.132.7.13

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stemmed from the 'bucket_path' parameter being passed through in filebucket requests. The fix in commit 0d6d299 explicitly deletes this parameter in the uri2indirection method, indicating it was the injection point. The function's failure to remove this parameter allowed attackers to control the file path used in shell commands, leading to arbitrary command execution via path manipulation.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

Pupp*t *.*.x ***or* *.*.** *n* *.*.x ***or* *.*.**, *n* Pupp*t *nt*rpris* (P*) Us*rs *.*, *.*, *.*.x, *.*.x, *n* *.*.x ***or* *.*.* *llows r*mot* *ut**nti**t** us*rs wit* ***nt SSL k*ys *n* *il*-*r**tion p*rmissions on t** pupp*t m*st*r to *x**ut* *r

Reasoning

T** vuln*r**ility st*mm** *rom t** '*u*k*t_p*t*' p*r*m*t*r **in* p*ss** t*rou** in *il**u*k*t r*qu*sts. T** *ix in *ommit ******* *xpli*itly **l*t*s t*is p*r*m*t*r in t** `uri*in*ir**tion` m*t*o*, in*i**tin* it w*s t** inj**tion point. T** `*un*tion`