CVSS2
Attack Vector
LOCAL
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:H/Au:N/C:C/I:C/A:C
EPSS
Percentile
5.1%
Untrusted search path vulnerability in Puppet Enterprise 2.8 before 2.8.7,
Puppet before 2.7.26 and 3.x before 3.6.2, Facter 1.6.x and 2.x before
2.0.2, Hiera before 1.3.4, and Mcollective before 2.5.2, when running with
Ruby 1.9.1 or earlier, allows local users to gain privileges via a Trojan
horse file in the current working directory, as demonstrated using (1)
rubygems/defaults/operating_system.rb, (2) Win32API.rb, (3) Win32API.so,
(4) safe_yaml.rb, (5) safe_yaml/deep.rb, or (6) safe_yaml/deep.so; or (7)
operatingsystem.rb, (8) operatingsystem.so, (9) osfamily.rb, or (10)
osfamily.so in puppet/confine.