CVSS 3 Base Score:
Posted On:
Assessed Risk Level:
By using the `resource_type` service, an attacker could cause puppet to load arbitrary Ruby files from the puppet master node's file system. While this behavior is not enabled by default, `auth.conf` settings could be modified to allow it. The exploit requires local file system access to the Puppet Master.Status:
Affected software versions:
- Affected Versions: Puppet 2.x (2.7.22 and earlier), 3.x (3.2.3 and earlier) | Puppet Enterprise 2.8.2 and earlier, 3.0.0
- Resolved in Puppet 2.7.23 and 3.2.4
- Resolved in Puppet Enterprise 2.8.3 and 3.0.1