Description
Puppet Enterprise 2017.3.x prior to 2017.3.3 are vulnerable to a remote execution bug when a specially crafted string was passed into the facter_task or puppet_conf tasks. This vulnerability only affects tasks in the affected modules, if you are not using puppet tasks you are not affected by this vulnerability.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-18264 | Puppet Enterprise 2017.3.x prior to 2017.3.3 are vulnerable to a remote execution bug when a specially crafted string was passed into the facter_task or puppet_conf tasks. This vulnerability only affects tasks in the affected modules, if you are not using puppet tasks you are not affected by this vulnerability. |
References
History
No history.
Status: PUBLISHED
Assigner: puppet
Published:
Updated: 2024-09-17T01:55:41.774Z
Reserved: 2018-02-01T00:00:00.000Z
Link: CVE-2018-6508
No data.
Status : Modified
Published: 2018-02-09T20:29:00.317
Modified: 2024-11-21T04:10:47.917
Link: CVE-2018-6508
OpenCVE Enrichment
No data.
EUVD