Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2014-3248

Опубликовано: 16 нояб. 2014
Источник: nvd
CVSS2: 6.2
EPSS Низкий

Описание

Untrusted search path vulnerability in Puppet Enterprise 2.8 before 2.8.7, Puppet before 2.7.26 and 3.x before 3.6.2, Facter 1.6.x and 2.x before 2.0.2, Hiera before 1.3.4, and Mcollective before 2.5.2, when running with Ruby 1.9.1 or earlier, allows local users to gain privileges via a Trojan horse file in the current working directory, as demonstrated using (1) rubygems/defaults/operating_system.rb, (2) Win32API.rb, (3) Win32API.so, (4) safe_yaml.rb, (5) safe_yaml/deep.rb, or (6) safe_yaml/deep.so; or (7) operatingsystem.rb, (8) operatingsystem.so, (9) osfamily.rb, or (10) osfamily.so in puppet/confine.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:puppet:facter:2.0.0:rc1:*:*:*:*:*:*
cpe:2.3:a:puppet:facter:2.0.0:rc2:*:*:*:*:*:*
cpe:2.3:a:puppet:facter:2.0.0:rc3:*:*:*:*:*:*
cpe:2.3:a:puppet:facter:2.0.0:rc4:*:*:*:*:*:*
cpe:2.3:a:puppet:facter:2.0.1:-:*:*:*:*:*:*
cpe:2.3:a:puppet:facter:2.0.1:rc1:*:*:*:*:*:*
cpe:2.3:a:puppet:facter:2.0.1:rc2:*:*:*:*:*:*
cpe:2.3:a:puppet:facter:2.0.1:rc3:*:*:*:*:*:*
cpe:2.3:a:puppet:facter:2.0.1:rc4:*:*:*:*:*:*
cpe:2.3:a:puppetlabs:facter:*:*:*:*:*:*:*:*
Версия от 1.6.0 (включая) до 1.6.18 (включая)
Конфигурация 2
cpe:2.3:a:puppet:marionette_collective:*:*:*:*:*:*:*:*
Версия до 2.5.2 (исключая)
Конфигурация 3
cpe:2.3:a:puppet:hiera:*:*:*:*:*:*:*:*
Версия до 1.3.4 (исключая)
Конфигурация 4

Одно из

cpe:2.3:a:puppet:puppet:*:*:*:*:*:*:*:*
Версия до 2.7.26 (исключая)
cpe:2.3:a:puppet:puppet:*:*:*:*:*:*:*:*
Версия от 3.6.0 (включая) до 3.6.2 (исключая)
cpe:2.3:a:puppet:puppet_enterprise:*:*:*:*:*:*:*:*
Версия от 2.8.0 (включая) до 2.8.7 (исключая)

EPSS

Процентиль: 38%
0.00164
Низкий

6.2 Medium

CVSS2

Дефекты

CWE-17

Связанные уязвимости

ubuntu
около 11 лет назад

Untrusted search path vulnerability in Puppet Enterprise 2.8 before 2.8.7, Puppet before 2.7.26 and 3.x before 3.6.2, Facter 1.6.x and 2.x before 2.0.2, Hiera before 1.3.4, and Mcollective before 2.5.2, when running with Ruby 1.9.1 or earlier, allows local users to gain privileges via a Trojan horse file in the current working directory, as demonstrated using (1) rubygems/defaults/operating_system.rb, (2) Win32API.rb, (3) Win32API.so, (4) safe_yaml.rb, (5) safe_yaml/deep.rb, or (6) safe_yaml/deep.so; or (7) operatingsystem.rb, (8) operatingsystem.so, (9) osfamily.rb, or (10) osfamily.so in puppet/confine.

redhat
больше 11 лет назад

Untrusted search path vulnerability in Puppet Enterprise 2.8 before 2.8.7, Puppet before 2.7.26 and 3.x before 3.6.2, Facter 1.6.x and 2.x before 2.0.2, Hiera before 1.3.4, and Mcollective before 2.5.2, when running with Ruby 1.9.1 or earlier, allows local users to gain privileges via a Trojan horse file in the current working directory, as demonstrated using (1) rubygems/defaults/operating_system.rb, (2) Win32API.rb, (3) Win32API.so, (4) safe_yaml.rb, (5) safe_yaml/deep.rb, or (6) safe_yaml/deep.so; or (7) operatingsystem.rb, (8) operatingsystem.so, (9) osfamily.rb, or (10) osfamily.so in puppet/confine.

debian
около 11 лет назад

Untrusted search path vulnerability in Puppet Enterprise 2.8 before 2. ...

github
больше 8 лет назад

facter, hiera, mcollective-client, and puppet affected by untrusted search path vulnerability

fstec
около 11 лет назад

Уязвимости операционной системы Gentoo Linux, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 38%
0.00164
Низкий

6.2 Medium

CVSS2

Дефекты

CWE-17