Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-a7cn-eqbq-qyb1
Vulnerability ID VCID-a7cn-eqbq-qyb1
Aliases CVE-2011-3871
GHSA-mpmx-gm5v-q789
Summary Puppet uses predictable filenames, allowing arbitrary file overwrite Puppet 2.7.x before 2.7.5, 2.6.x before 2.6.11, and 0.25.x, when running in --edit mode, uses a predictable file name, which allows local users to run arbitrary Puppet code or trick a user into editing arbitrary files.
Status Published
Exploitability 0.5
Weighted Severity 6.2
Risk 3.1
Affected and Fixed Packages Package Details
Weaknesses (5)
System Score Found at
generic_textual MODERATE http://groups.google.com/group/puppet-announce/browse_thread/thread/91e3b46d2328a1cb
generic_textual MODERATE http://lists.fedoraproject.org/pipermail/package-announce/2011-October/068053.html
generic_textual MODERATE http://lists.fedoraproject.org/pipermail/package-announce/2011-October/068061.html
generic_textual MODERATE http://lists.fedoraproject.org/pipermail/package-announce/2011-October/068093.html
epss 0.00042 https://api.first.org/data/v1/epss?cve=CVE-2011-3871
epss 0.00042 https://api.first.org/data/v1/epss?cve=CVE-2011-3871
epss 0.00042 https://api.first.org/data/v1/epss?cve=CVE-2011-3871
epss 0.00042 https://api.first.org/data/v1/epss?cve=CVE-2011-3871
epss 0.00042 https://api.first.org/data/v1/epss?cve=CVE-2011-3871
epss 0.00042 https://api.first.org/data/v1/epss?cve=CVE-2011-3871
epss 0.00042 https://api.first.org/data/v1/epss?cve=CVE-2011-3871
epss 0.00042 https://api.first.org/data/v1/epss?cve=CVE-2011-3871
epss 0.00042 https://api.first.org/data/v1/epss?cve=CVE-2011-3871
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-mpmx-gm5v-q789
generic_textual MODERATE https://github.com/puppetlabs/puppet
generic_textual MODERATE https://github.com/puppetlabs/puppet/commit/343c7bd381b63e042d437111718918f951d9b30d
generic_textual MODERATE https://github.com/puppetlabs/puppet/commit/d76c30935460ded953792dfe49f72b8c5158e899
generic_textual MODERATE https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puppet/CVE-2011-3871.yml
generic_textual MODERATE https://nvd.nist.gov/vuln/detail/CVE-2011-3871
generic_textual MODERATE https://puppet.com/security/cve/cve-2011-3871
generic_textual MODERATE http://www.debian.org/security/2011/dsa-2314
generic_textual MODERATE http://www.ubuntu.com/usn/USN-1223-1
generic_textual MODERATE http://www.ubuntu.com/usn/USN-1223-2
No exploits are available.
Exploit Prediction Scoring System (EPSS)
Percentile 0.12958
EPSS Score 0.00042
Published At April 12, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T12:50:38.782112+00:00 GitLab Importer Import https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/puppet/CVE-2011-3871.yml 38.0.0