Arbitrary Code Execution Affecting puppet package, versions <2.7.26 >=3.0.0, <3.6.2
Threat Intelligence
EPSS
0.04% (6th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RUBY-PUPPET-20329
- published 28 Feb 2017
- disclosed 10 Jun 2014
- credit Dennis Rowe
Introduced: 10 Jun 2014
CVE-2014-3248 Open this link in a new tabHow to fix?
Upgrade puppet
to version 2.7.26, 3.6.2 or higher.
Overview
puppet
is an automated configuration management tool.
Affected versions of the package are vulnerable to Arbitrary Code Execution. An attacker could have Puppet execute malicious code by convincing a privileged user to change directories to one containing the malicious code and then run Puppet.
Note: On platforms with Ruby 1.9.1 or earlier.
CVSS Scores
version 3.1