CVE-2014-3248
Summary
| CVE | CVE-2014-3248 |
|---|---|
| State | PUBLISHED |
| Assigner | mitre |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2014-11-16 17:59:03 UTC |
| Updated | 2026-05-06 22:30:45 UTC |
| Description | Untrusted search path vulnerability in Puppet Enterprise 2.8 before 2.8.7, Puppet before 2.7.26 and 3.x before 3.6.2, Facter 1.6.x and 2.x before 2.0.2, Hiera before 1.3.4, and Mcollective before 2.5.2, when running with Ruby 1.9.1 or earlier, allows local users to gain privileges via a Trojan horse file in the current working directory, as demonstrated using (1) rubygems/defaults/operating_system.rb, (2) Win32API.rb, (3) Win32API.so, (4) safe_yaml.rb, (5) safe_yaml/deep.rb, or (6) safe_yaml/deep.so; or (7) operatingsystem.rb, (8) operatingsystem.so, (9) osfamily.rb, or (10) osfamily.so in puppet/confine. |
Risk And Classification
CVSS v2.0 Breakdown
Access Vector
LocalAccess Complexity
HighAuthentication
NoneConfidentiality
CompleteIntegrity
CompleteAvailability
CompleteAV:L/AC:H/Au:N/C:C/I:C/A:C
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Puppet | Facter | 2.0.0 | rc1 | All | All |
| Application | Puppet | Facter | 2.0.0 | rc2 | All | All |
| Application | Puppet | Facter | 2.0.0 | rc3 | All | All |
| Application | Puppet | Facter | 2.0.0 | rc4 | All | All |
| Application | Puppet | Facter | 2.0.1 | - | All | All |
| Application | Puppet | Facter | 2.0.1 | rc1 | All | All |
| Application | Puppet | Facter | 2.0.1 | rc2 | All | All |
| Application | Puppet | Facter | 2.0.1 | rc3 | All | All |
| Application | Puppet | Facter | 2.0.1 | rc4 | All | All |
| Application | Puppet | Hiera | All | All | All | All |
| Application | Puppet | Marionette Collective | All | All | All | All |
| Application | Puppet | Puppet | All | All | All | All |
| Application | Puppetlabs | Facter | All | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Security Advisory SA59197 - Puppet Security Bypass Security Issue and Code Execution Vulnerability - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Technical Description |
| CVE-2014-3248 | Puppet Labs | af854a3a-2127-422b-91ae-364da2661108 | puppetlabs.com | Vendor Advisory |
| CVE-2014-3248 - A little problem with Puppet - Exceptions Passing in the Night | af854a3a-2127-422b-91ae-364da2661108 | rowediness.com | Exploit, Technical Description |
| Multiple Puppet Products CVE-2014-3248 Remote Code Execution Vulnerability | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | Third Party Advisory, VDB Entry |
| Security Advisory SA59200 - Puppet Labs Multiple Products Code Execution Vulnerability - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Technical Description |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.