puppet -- multiple vulnerabilities

ID 2B2F6092-0694-11E3-9E8E-000C29F6AE42
Type freebsd
Reporter FreeBSD
Modified 2013-07-05T00:00:00


Puppet Labs reports:

By using the resource_type service, an attacker could cause puppet to load arbitrary Ruby files from the puppet master node's file system. While this behavior is not enabled by default, auth.conf settings could be modified to allow it. The exploit requires local file system access to the Puppet Master. Puppet Module Tool (PMT) did not correctly control permissions of modules it installed, instead transferring permissions that existed when the module was built.