CVE-2017-10689: Improper Privilege Management
(updated )
In previous versions of Puppet Agent it was possible to install a module with world writable permissions. Puppet Agent 5.3.4 and 1.10.10 included a fix to this vulnerability.
References
- access.redhat.com/errata/RHSA-2018:2927
- github.com/advisories/GHSA-vw22-465p-8j5w
- github.com/puppetlabs/puppet/commit/17d9e02da3882e44c1876e2805cf9708481715ee
- github.com/puppetlabs/puppet/commit/2f1047f85e22cde139a421bc25d371f2ffc92cb1
- github.com/rubysec/ruby-advisory-db/blob/master/gems/puppet/CVE-2017-10689.yml
- nvd.nist.gov/vuln/detail/CVE-2017-10689
- puppet.com/security/cve/CVE-2017-10689
- tickets.puppetlabs.com/browse/PUP-7866
- usn.ubuntu.com/3567-1/
Detect and mitigate CVE-2017-10689 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →