First published: Mon Jun 11 2018(Updated: )
Puppet Enterprise 2016.4.x prior to 2016.4.12, Puppet Enterprise 2017.3.x prior to 2017.3.7, Puppet Enterprise 2018.1.x prior to 2018.1.1, Puppet Agent 1.10.x prior to 1.10.13, Puppet Agent 5.3.x prior to 5.3.7, and Puppet Agent 5.5.x prior to 5.5.2, were vulnerable to an attack where an unprivileged user on Windows agents could write custom facts that can escalate privileges on the next puppet run. This was possible through the loading of shared libraries from untrusted paths.
Credit: security@puppet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Puppet Puppet | >=1.10.0<1.10.13 | |
Puppet Puppet | >=5.3.0<5.3.7 | |
Puppet Puppet | >=5.5.0<5.5.2 | |
Puppet Puppet Enterprise | >=2016.4.0<2016.4.12 | |
Puppet Puppet Enterprise | >=2017.3.0<2017.3.7 | |
Puppet Puppet Enterprise | >=2018.1.0<2018.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-6513 is a vulnerability in Puppet Enterprise and Puppet Agent that allows an unprivileged user to run arbitrary code.
Puppet Enterprise versions 2016.4.x to 2016.4.12, 2017.3.x to 2017.3.7, and 2018.1.x to 2018.1.1, as well as Puppet Agent versions 1.10.x to 1.10.13, 5.3.x to 5.3.7, and 5.5.x to 5.5.2 are affected.
CVE-2018-6513 has a severity value of 8.8, which is considered high.
To fix CVE-2018-6513, it is recommended to upgrade to Puppet Enterprise version 2016.4.12, 2017.3.7, or 2018.1.1, or Puppet Agent version 1.10.13, 5.3.7, or 5.5.2.
More information about CVE-2018-6513 can be found at the following link: https://puppet.com/security/cve/CVE-2018-6513