First published: Fri Mar 03 2017(Updated: )
On Windows installations of the mcollective-puppet-agent plugin, version 1.12.0, a non-administrator user can create an executable that will be executed with administrator privileges on the next "mco puppet" run. Puppet Enterprise users are not affected. This is resolved in mcollective-puppet-agent 1.12.1.
Credit: security@puppet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Puppet MCollective | =1.12.0 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-2290 has been rated as a high severity vulnerability due to the potential for privilege escalation by non-administrator users.
CVE-2017-2290 allows non-administrator users on Windows to create executables that run with administrator privileges during the next 'mco puppet' execution.
CVE-2017-2290 specifically affects Windows installations of mcollective-puppet-agent version 1.12.0, while Puppet Enterprise users are not impacted.
To fix CVE-2017-2290, upgrade the mcollective-puppet-agent to a version beyond 1.12.0 that addresses this vulnerability.
The best mitigation for CVE-2017-2290 is to ensure that users without administrative privileges are not allowed to execute the 'mco puppet' command.