Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2018-6513


Puppet Enterprise 2016.4.x prior to 2016.4.12, Puppet Enterprise 2017.3.x prior to 2017.3.7, Puppet Enterprise 2018.1.x prior to 2018.1.1, Puppet Agent 1.10.x prior to 1.10.13, Puppet Agent 5.3.x prior to 5.3.7, and Puppet Agent 5.5.x prior to 5.5.2, were vulnerable to an attack where an unprivileged user on Windows agents could write custom facts that can escalate privileges on the next puppet run. This was possible through the loading of shared libraries from untrusted paths.


Published

2018-06-11T20:29:00.267

Last Modified

2024-11-21T04:10:48.390

Status

Modified

Source

[email protected]

Severity

CVSSv3.0: 8.8 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:S/C:P/I:P/A:P

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: SINGLE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

8.0

Impact Score

6.4

Weaknesses
  • Type: Primary
    CWE-426

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application puppet puppet < 1.10.13 Yes
Application puppet puppet < 5.3.7 Yes
Application puppet puppet < 5.5.2 Yes
Application puppet puppet_enterprise < 2016.4.12 Yes
Application puppet puppet_enterprise < 2017.3.7 Yes
Application puppet puppet_enterprise < 2018.1.1 Yes

References