Skip to content

facter, hiera, mcollective-client, and puppet affected by untrusted search path vulnerability

Moderate severity GitHub Reviewed Published Oct 24, 2017 to the GitHub Advisory Database • Updated Jun 7, 2023

Package

bundler facter (RubyGems)

Affected versions

< 1.7.6
>= 2.0.0, < 2.0.2

Patched versions

1.7.6
2.0.2
bundler hiera (RubyGems)
< 1.3.4
1.3.4
bundler mcollective-client (RubyGems)
< 2.5.2
2.5.2
bundler puppet (RubyGems)
< 2.7.26
>= 3.0.0, < 3.6.2
2.7.26
3.6.2

Description

Untrusted search path vulnerability in Puppet Enterprise 2.8 before 2.8.7, Puppet before 2.7.26 and 3.x before 3.6.2, Facter 1.6.x and 2.x before 2.0.2, Hiera before 1.3.4, and Mcollective before 2.5.2, when running with Ruby 1.9.1 or earlier, allows local users to gain privileges via a Trojan horse file in the current working directory, as demonstrated using (1) rubygems/defaults/operating_system.rb, (2) Win32API.rb, (3) Win32API.so, (4) safe_yaml.rb, (5) safe_yaml/deep.rb, or (6) safe_yaml/deep.so; or (7) operatingsystem.rb, (8) operatingsystem.so, (9) osfamily.rb, or (10) osfamily.so in puppet/confine.

References

Published by the National Vulnerability Database Nov 16, 2014
Published to the GitHub Advisory Database Oct 24, 2017
Reviewed Jun 16, 2020
Last updated Jun 7, 2023

Severity

Moderate

EPSS score

0.042%
(5th percentile)

Weaknesses

No CWEs

CVE ID

CVE-2014-3248

GHSA ID

GHSA-92v7-pq4h-58j5

Source code

No known source code
Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.