Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2022-3275

Опубликовано: 07 окт. 2022
Источник: ubuntu
Приоритет: medium
CVSS3: 8.4

Описание

Command injection is possible in the puppetlabs-apt module prior to version 9.0.0. A malicious actor is able to exploit this vulnerability only if they are able to provide unsanitized input to the module. This condition is rare in most deployments of Puppet and Puppet Enterprise.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

not-affected

9.0.1-1
esm-apps/bionic

needs-triage

esm-apps/focal

needs-triage

esm-apps/jammy

needs-triage

esm-apps/noble

not-affected

9.0.1-1
esm-apps/xenial

needs-triage

focal

ignored

end of standard support, was needs-triage
jammy

needs-triage

kinetic

ignored

end of life, was needs-triage

Показывать по

8.4 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
redhat
около 3 лет назад

Command injection is possible in the puppetlabs-apt module prior to version 9.0.0. A malicious actor is able to exploit this vulnerability only if they are able to provide unsanitized input to the module. This condition is rare in most deployments of Puppet and Puppet Enterprise.

CVSS3: 8.4
nvd
больше 3 лет назад

Command injection is possible in the puppetlabs-apt module prior to version 9.0.0. A malicious actor is able to exploit this vulnerability only if they are able to provide unsanitized input to the module. This condition is rare in most deployments of Puppet and Puppet Enterprise.

CVSS3: 8.4
debian
больше 3 лет назад

Command injection is possible in the puppetlabs-apt module prior to ve ...

8.4 High

CVSS3