{"id":"CVE-2011-3871","details":"Puppet 2.7.x before 2.7.5, 2.6.x before 2.6.11, and 0.25.x, when running in --edit mode, uses a predictable file name, which allows local users to run arbitrary Puppet code or trick a user into editing arbitrary files.","aliases":["GHSA-mpmx-gm5v-q789"],"modified":"2026-01-27T04:11:56.912090Z","published":"2011-10-27T20:55:01Z","withdrawn":"2026-01-27T04:11:56.912090Z","references":[{"type":"ADVISORY","url":"http://secunia.com/advisories/46458"},{"type":"ADVISORY","url":"http://www.debian.org/security/2011/dsa-2314"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-1223-1"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-1223-2"},{"type":"FIX","url":"http://groups.google.com/group/puppet-announce/browse_thread/thread/91e3b46d2328a1cb"},{"type":"FIX","url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-October/068053.html"},{"type":"FIX","url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-October/068061.html"},{"type":"FIX","url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-October/068093.html"},{"type":"WEB","url":"https://puppet.com/security/cve/cve-2011-3871"}],"schema_version":"1.7.3"}