Puppet Symlink File Overwrite

This script is Copyright (C) 2014 Tenable Network Security, Inc.

Synopsis :

A web application on the remote host is potentially affected by a file
overwrite vulnerability.

Description :

According to its self-reported version number, the Puppet install on
the remote host is potentially affected by an error related to temporary
files and their use. A local attacker could potentially use a symlink
attack to overwrite arbitrary files.

See also :


Solution :

Upgrade to Puppet 3.3.3 / 3.4.1 or Puppet Enterprise 2.8.4 / 3.1.1 or

Risk factor :

Low / CVSS Base Score : 2.1
CVSS Temporal Score : 1.8
Public Exploit Available : true

Family: CGI abuses

Nessus Plugin ID: 72151 ()

Bugtraq ID: 64552

CVE ID: CVE-2013-4969

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now