First published: Fri Feb 09 2018(Updated: )
Puppet Enterprise 2017.3.x prior to 2017.3.3 are vulnerable to a remote execution bug when a specially crafted string was passed into the facter_task or puppet_conf tasks. This vulnerability only affects tasks in the affected modules, if you are not using puppet tasks you are not affected by this vulnerability.
Credit: security@puppet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Puppet Enterprise | >=2017.3.0<=2017.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for Puppet Enterprise 2017.3.x is CVE-2018-6508.
The severity level of CVE-2018-6508 is high.
CVE-2018-6508 affects Puppet Enterprise 2017.3.x by allowing remote execution when a specially crafted string is passed into the facter_task or puppet_conf tasks.
If you are using Puppet Enterprise 2017.3.x prior to version 2017.3.3, your system may be affected by CVE-2018-6508.
More information about CVE-2018-6508 can be found at the following references: - [http://www.securityfocus.com/bid/103020](http://www.securityfocus.com/bid/103020) - [https://puppet.com/security/cve/CVE-2018-6508](https://puppet.com/security/cve/CVE-2018-6508)