On Windows only, with a specifically crafted configuration file an attacker could get Puppet PE client tools (aka pe-client-tools) 16.4.x prior to 16.4.6, 17.3.x prior to 17.3.6, and 18.1.x prior to 18.1.2 to load arbitrary code with privilege escalation.
[
{
"product": "pe-client-tools",
"vendor": "Puppet",
"versions": [
{
"status": "affected",
"version": "16.4.x prior to 16.4.6"
},
{
"status": "affected",
"version": "17.3.x prior to 17.3.6"
},
{
"status": "affected",
"version": "18.1.x prior to 18.1.2"
}
]
}
]