6.2

CVE-2014-3248

Exploit

Untrusted search path vulnerability in Puppet Enterprise 2.8 before 2.8.7, Puppet before 2.7.26 and 3.x before 3.6.2, Facter 1.6.x and 2.x before 2.0.2, Hiera before 1.3.4, and Mcollective before 2.5.2, when running with Ruby 1.9.1 or earlier, allows local users to gain privileges via a Trojan horse file in the current working directory, as demonstrated using (1) rubygems/defaults/operating_system.rb, (2) Win32API.rb, (3) Win32API.so, (4) safe_yaml.rb, (5) safe_yaml/deep.rb, or (6) safe_yaml/deep.so; or (7) operatingsystem.rb, (8) operatingsystem.so, (9) osfamily.rb, or (10) osfamily.so in puppet/confine.

Data is provided by the National Vulnerability Database (NVD)
PuppetFacter Version2.0.0 Updaterc1
PuppetFacter Version2.0.0 Updaterc2
PuppetFacter Version2.0.0 Updaterc3
PuppetFacter Version2.0.0 Updaterc4
PuppetFacter Version2.0.1 Update-
PuppetFacter Version2.0.1 Updaterc1
PuppetFacter Version2.0.1 Updaterc2
PuppetFacter Version2.0.1 Updaterc3
PuppetFacter Version2.0.1 Updaterc4
PuppetlabsFacter Version >= 1.6.0 <= 1.6.18
PuppetMarionette Collective Version < 2.5.2
PuppetHiera Version < 1.3.4
PuppetPuppet Version < 2.7.26
PuppetPuppet Version >= 3.6.0 < 3.6.2
PuppetPuppet Enterprise Version >= 2.8.0 < 2.8.7
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.16% 0.342
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 6.2 1.9 10
AV:L/AC:H/Au:N/C:C/I:C/A:C