CVE-2012-3867: Moderate severity vulnerability that affects puppet
(updated )
lib/puppet/ssl/certificate_authority.rb in Puppet before 2.6.17 and 2.7.x before 2.7.18, and Puppet Enterprise before 2.5.2, does not properly restrict the characters in the Common Name field of a Certificate Signing Request (CSR), which makes it easier for user-assisted remote attackers to trick administrators into signing a crafted agent certificate via ANSI control sequences.
References
- lists.opensuse.org/opensuse-security-announce/2012-08/msg00006.html
- lists.opensuse.org/opensuse-updates/2012-07/msg00036.html
- puppetlabs.com/security/cve/cve-2012-3867/
- secunia.com/advisories/50014
- www.debian.org/security/2012/dsa-2511
- www.ubuntu.com/usn/USN-1506-1
- bugzilla.redhat.com/show_bug.cgi?id=839158
- github.com/advisories/GHSA-q44r-f2hm-v76v
- github.com/puppetlabs/puppet/commit/dfedaa5fa841ccf335245a748b347b7c7c236640
- github.com/puppetlabs/puppet/commit/f3419620b42080dad3b0be14470b20a972f13c50
- nvd.nist.gov/vuln/detail/CVE-2012-3867
Detect and mitigate CVE-2012-3867 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →