Command injection is possible in the puppetlabs-apt module prior to version 9.0.0. A malicious actor is able to exploit this vulnerability only if they are able to provide unsanitized input to the module. This condition is rare in most deployments of Puppet and Puppet Enterprise.
References
Link | Resource |
---|---|
https://puppet.com/security/cve/CVE-2022-3275 | Vendor Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YR5LIOF5VKS4DC2NQWXTMPPXOYJC46XC/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CH4NUKZKPY4MFQHFBTONJK2AWES4DFDA/ | Mailing List Third Party Advisory |
Information
Published : 2022-10-07 14:15
Updated : 2023-02-28 07:32
NVD link : CVE-2022-3275
Mitre link : CVE-2022-3275
JSON object : View
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
Products Affected
fedoraproject
- fedora
puppet
- puppetlabs-mysql