Lucene search

K
rubygemsRubySecRUBY:PUPPET-2014-3248
HistoryOct 23, 2017 - 9:00 p.m.

Moderate severity vulnerability that affects facter, hiera, mcollective-client, and puppet

2017-10-2321:00:00
RubySec
github.com
9

CVSS2

6.2

Attack Vector

LOCAL

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:H/Au:N/C:C/I:C/A:C

Untrusted search path vulnerability in Puppet Enterprise 2.8 before 2.8.7,
Puppet before 2.7.26 and 3.x before 3.6.2, Facter 1.6.x and 2.x before 2.0.2, Hiera
before 1.3.4, and Mcollective before 2.5.2, when running with Ruby 1.9.1 or earlier,
allows local users to gain privileges via a Trojan horse file in the current working
directory, as demonstrated using (1) rubygems/defaults/operating_system.rb, (2)
Win32API.rb, (3) Win32API.so, (4) safe_yaml.rb, (5) safe_yaml/deep.rb, or (6) safe_yaml/deep.so;
or (7) operatingsystem.rb, (8) operatingsystem.so, (9) osfamily.rb, or (10) osfamily.so
in puppet/confine.

Affected configurations

Vulners
Node
rubypuppetRange2.7.02.7.26
OR
rubypuppetRange3.6.2
VendorProductVersionCPE
rubypuppet*cpe:2.3:a:ruby:puppet:*:*:*:*:*:*:*:*

CVSS2

6.2

Attack Vector

LOCAL

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:H/Au:N/C:C/I:C/A:C