Lucene search

K
nvd[email protected]NVD:CVE-2014-3248
HistoryNov 16, 2014 - 5:59 p.m.

CVE-2014-3248

2014-11-1617:59:03
CWE-17
web.nvd.nist.gov

6.2 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:H/Au:N/C:C/I:C/A:C

6.3 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%

Untrusted search path vulnerability in Puppet Enterprise 2.8 before 2.8.7, Puppet before 2.7.26 and 3.x before 3.6.2, Facter 1.6.x and 2.x before 2.0.2, Hiera before 1.3.4, and Mcollective before 2.5.2, when running with Ruby 1.9.1 or earlier, allows local users to gain privileges via a Trojan horse file in the current working directory, as demonstrated using (1) rubygems/defaults/operating_system.rb, (2) Win32API.rb, (3) Win32API.so, (4) safe_yaml.rb, (5) safe_yaml/deep.rb, or (6) safe_yaml/deep.so; or (7) operatingsystem.rb, (8) operatingsystem.so, (9) osfamily.rb, or (10) osfamily.so in puppet/confine.

Affected configurations

NVD
Node
puppetfacterMatch2.0.0rc1
OR
puppetfacterMatch2.0.0rc2
OR
puppetfacterMatch2.0.0rc3
OR
puppetfacterMatch2.0.0rc4
OR
puppetfacterMatch2.0.1-
OR
puppetfacterMatch2.0.1rc1
OR
puppetfacterMatch2.0.1rc2
OR
puppetfacterMatch2.0.1rc3
OR
puppetfacterMatch2.0.1rc4
OR
puppetlabsfacterRange1.6.01.6.18
Node
puppetmarionette_collectiveRange<2.5.2
Node
puppethieraRange<1.3.4
Node
puppetpuppetRange<2.7.26
OR
puppetpuppetRange3.6.03.6.2
OR
puppetpuppet_enterpriseRange2.8.02.8.7

6.2 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:H/Au:N/C:C/I:C/A:C

6.3 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%