CVE-2014-3248
Summary
| CVE | CVE-2014-3248 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2014-11-16 17:59:00 UTC |
| Updated | 2019-07-16 12:22:00 UTC |
| Description | Untrusted search path vulnerability in Puppet Enterprise 2.8 before 2.8.7, Puppet before 2.7.26 and 3.x before 3.6.2, Facter 1.6.x and 2.x before 2.0.2, Hiera before 1.3.4, and Mcollective before 2.5.2, when running with Ruby 1.9.1 or earlier, allows local users to gain privileges via a Trojan horse file in the current working directory, as demonstrated using (1) rubygems/defaults/operating_system.rb, (2) Win32API.rb, (3) Win32API.so, (4) safe_yaml.rb, (5) safe_yaml/deep.rb, or (6) safe_yaml/deep.so; or (7) operatingsystem.rb, (8) operatingsystem.so, (9) osfamily.rb, or (10) osfamily.so in puppet/confine. |
Risk And Classification
Problem Types: CWE-17
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Puppet | Facter | 2.0.0 | rc1 | All | All |
| Application | Puppet | Facter | 2.0.0 | rc2 | All | All |
| Application | Puppet | Facter | 2.0.0 | rc3 | All | All |
| Application | Puppet | Facter | 2.0.0 | rc4 | All | All |
| Application | Puppet | Facter | 2.0.1 | - | All | All |
| Application | Puppet | Facter | 2.0.1 | rc1 | All | All |
| Application | Puppet | Facter | 2.0.1 | rc2 | All | All |
| Application | Puppet | Facter | 2.0.1 | rc3 | All | All |
| Application | Puppet | Facter | 2.0.1 | rc4 | All | All |
| Application | Puppet | Facter | 2.0.0 | rc1 | All | All |
| Application | Puppet | Facter | 2.0.0 | rc2 | All | All |
| Application | Puppet | Facter | 2.0.0 | rc3 | All | All |
| Application | Puppet | Facter | 2.0.0 | rc4 | All | All |
| Application | Puppet | Facter | 2.0.1 | - | All | All |
| Application | Puppet | Facter | 2.0.1 | rc1 | All | All |
| Application | Puppet | Facter | 2.0.1 | rc2 | All | All |
| Application | Puppet | Facter | 2.0.1 | rc3 | All | All |
| Application | Puppet | Facter | 2.0.1 | rc4 | All | All |
| Application | Puppet | Hiera | All | All | All | All |
| Application | Puppet | Hiera | All | All | All | All |
| Application | Puppet | Marionette Collective | All | All | All | All |
| Application | Puppet | Marionette Collective | All | All | All | All |
| Application | Puppet | Puppet | All | All | All | All |
| Application | Puppet | Puppet | All | All | All | All |
| Application | Puppet | Puppet Enterprise | All | All | All | All |
| Application | Puppet | Puppet Enterprise | All | All | All | All |
| Application | Puppetlabs | Facter | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| CVE-2014-3248 - A little problem with Puppet - Exceptions Passing in the Night | MISC | rowediness.com | Exploit, Technical Description |
| Security Advisory SA59197 - Puppet Security Bypass Security Issue and Code Execution Vulnerability - Secunia | SECUNIA | secunia.com | Technical Description |
| CVE-2014-3248 | Puppet Labs | CONFIRM | puppetlabs.com | Vendor Advisory |
| Security Advisory SA59200 - Puppet Labs Multiple Products Code Execution Vulnerability - Secunia | SECUNIA | secunia.com | Technical Description |
| Multiple Puppet Products CVE-2014-3248 Remote Code Execution Vulnerability | BID | www.securityfocus.com | Third Party Advisory, VDB Entry |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.