Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-3275

Опубликовано: 07 окт. 2022
Источник: debian
EPSS Низкий

Описание

Command injection is possible in the puppetlabs-apt module prior to version 9.0.0. A malicious actor is able to exploit this vulnerability only if they are able to provide unsanitized input to the module. This condition is rare in most deployments of Puppet and Puppet Enterprise.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
puppet-module-puppetlabs-aptfixed9.0.1-1package
puppet-module-puppetlabs-aptno-dsabullseyepackage
puppet-module-puppetlabs-aptpostponedbusterpackage

Примечания

  • https://puppet.com/security/cve/CVE-2022-3275

  • https://github.com/puppetlabs/puppetlabs-apt/commit/c26ad2a54f318b4d6fbe55f837b00cd6afd9f1eb (v9.0.0)

EPSS

Процентиль: 86%
0.03006
Низкий

Связанные уязвимости

CVSS3: 8.4
ubuntu
больше 3 лет назад

Command injection is possible in the puppetlabs-apt module prior to version 9.0.0. A malicious actor is able to exploit this vulnerability only if they are able to provide unsanitized input to the module. This condition is rare in most deployments of Puppet and Puppet Enterprise.

CVSS3: 7.5
redhat
около 3 лет назад

Command injection is possible in the puppetlabs-apt module prior to version 9.0.0. A malicious actor is able to exploit this vulnerability only if they are able to provide unsanitized input to the module. This condition is rare in most deployments of Puppet and Puppet Enterprise.

CVSS3: 8.4
nvd
больше 3 лет назад

Command injection is possible in the puppetlabs-apt module prior to version 9.0.0. A malicious actor is able to exploit this vulnerability only if they are able to provide unsanitized input to the module. This condition is rare in most deployments of Puppet and Puppet Enterprise.

EPSS

Процентиль: 86%
0.03006
Низкий