Description
On Windows installations of the mcollective-puppet-agent plugin, version 1.12.0, a non-administrator user can create an executable that will be executed with administrator privileges on the next "mco puppet" run. Puppet Enterprise users are not affected. This is resolved in mcollective-puppet-agent 1.12.1.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2017-11473 | On Windows installations of the mcollective-puppet-agent plugin, version 1.12.0, a non-administrator user can create an executable that will be executed with administrator privileges on the next "mco puppet" run. Puppet Enterprise users are not affected. This is resolved in mcollective-puppet-agent 1.12.1. |
References
History
No history.
Status: PUBLISHED
Assigner: puppet
Published:
Updated: 2024-08-05T13:48:05.267Z
Reserved: 2016-12-01T00:00:00.000Z
Link: CVE-2017-2290
No data.
Status : Modified
Published: 2017-03-03T15:59:00.647
Modified: 2026-05-13T00:24:29.033
Link: CVE-2017-2290
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD