MEDIUM · 6.2

CVE-2014-3248

Untrusted search path vulnerability in Puppet Enterprise 2.8 before 2.8.7, Puppet before 2.7.26 and 3.x before 3.6.2, Facter 1.6.x and 2.x before 2.0.2, Hiera before 1.3.4, and Mcollective before 2.5....

Vulnerability Description

Untrusted search path vulnerability in Puppet Enterprise 2.8 before 2.8.7, Puppet before 2.7.26 and 3.x before 3.6.2, Facter 1.6.x and 2.x before 2.0.2, Hiera before 1.3.4, and Mcollective before 2.5.2, when running with Ruby 1.9.1 or earlier, allows local users to gain privileges via a Trojan horse file in the current working directory, as demonstrated using (1) rubygems/defaults/operating_system.rb, (2) Win32API.rb, (3) Win32API.so, (4) safe_yaml.rb, (5) safe_yaml/deep.rb, or (6) safe_yaml/deep.so; or (7) operatingsystem.rb, (8) operatingsystem.so, (9) osfamily.rb, or (10) osfamily.so in puppet/confine.

CVSS Score

6.2

MEDIUM

AV:L/AC:H/Au:N/C:C/I:C/A:C
Confidentiality
COMPLETE
Integrity
COMPLETE
Availability
COMPLETE

Affected Products

VendorProductVersions
PuppetFacter2.0.0
PuppetlabsFacter>= 1.6.0, <= 1.6.18
PuppetMarionette Collective< 2.5.2
PuppetHiera< 1.3.4
PuppetPuppet< 2.7.26
PuppetPuppet Enterprise>= 2.8.0, < 2.8.7

Related Weaknesses (CWE)

References

FAQ

What is CVE-2014-3248?

CVE-2014-3248 is a vulnerability with a CVSS score of 6.2 (MEDIUM). Untrusted search path vulnerability in Puppet Enterprise 2.8 before 2.8.7, Puppet before 2.7.26 and 3.x before 3.6.2, Facter 1.6.x and 2.x before 2.0.2, Hiera before 1.3.4, and Mcollective before 2.5....

How severe is CVE-2014-3248?

CVE-2014-3248 has been rated MEDIUM with a CVSS base score of 6.2/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2014-3248?

Check the references section above for vendor advisories and patch information. Affected products include: Puppet Facter, Puppetlabs Facter, Puppet Marionette Collective, Puppet Hiera, Puppet Puppet.