facter, hiera, mcollective-client, and puppet affected by untrusted search path vulnerability
Moderate severity
GitHub Reviewed
Published
Oct 24, 2017
to the GitHub Advisory Database
•
Updated Jun 7, 2023
Description
Published by the National Vulnerability Database
Nov 16, 2014
Published to the GitHub Advisory Database
Oct 24, 2017
Reviewed
Jun 16, 2020
Last updated
Jun 7, 2023
Untrusted search path vulnerability in Puppet Enterprise 2.8 before 2.8.7, Puppet before 2.7.26 and 3.x before 3.6.2, Facter 1.6.x and 2.x before 2.0.2, Hiera before 1.3.4, and Mcollective before 2.5.2, when running with Ruby 1.9.1 or earlier, allows local users to gain privileges via a Trojan horse file in the current working directory, as demonstrated using (1)
rubygems/defaults/operating_system.rb
, (2)Win32API.rb
, (3)Win32API.so
, (4)safe_yaml.rb
, (5)safe_yaml/deep.rb
, or (6)safe_yaml/deep.so
; or (7)operatingsystem.rb
, (8)operatingsystem.so
, (9)osfamily.rb
, or (10)osfamily.so
inpuppet/confine
.References