CVE-2014-3248 (Arbitrary Code Execution with Required Social Engineering)

  • Posted June 10, 2014

  • Assessed Risk Level: Medium

On platforms with Ruby 1.9.1 or earlier, an attacker could have Puppet execute malicious code by convincing a privileged user to change directories to one containing the malicious code and then run Puppet.

CVSSv2 Score: 5.2



Affected Software Versions (platforms with Ruby 1.9.1 and earlier only):

  • Puppet Enterprise 2.8 (all)
  • Puppet (all)
  • Facter (all)
  • Hiera (all)
  • Mcollective (all)

Resolved in:

  • Puppet Enterprise 2.8.7
  • Puppet 3.6.2
  • Puppet 2.7.26
  • Facter 2.0.2
  • Facter 1.7.6
  • Hiera 1.3.4
  • Mcollective 2.5.2


Acknowledgement for the responsible disclosure of this vulnerability to Puppet Labs

  • Dennis Rowe (shr3kst3r)
Puppet sites use proprietary and third-party cookies. By using our sites, you agree to our cookie policy.