CVE-2018-6508Use of Externally-Controlled Format String in Enterprise

Severity
8.0HIGHNVD
EPSS
0.9%
top 24.23%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 9
Latest updateMay 13

Description

Puppet Enterprise 2017.3.x prior to 2017.3.3 are vulnerable to a remote execution bug when a specially crafted string was passed into the facter_task or puppet_conf tasks. This vulnerability only affects tasks in the affected modules, if you are not using puppet tasks you are not affected by this vulnerability.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:HExploitability: 2.1 | Impact: 5.9

Affected Packages7 packages

NVDpuppet/puppet_enterprise2017.3.02017.3.2
CVEListV5puppet/puppet_enterprise2017.3.x prior to 2017.3.4
CVEListV5puppet/puppetlabs_aptprior to 4.5.1
CVEListV5puppet/puppetlabs_mysqlprior to 5.2.1
CVEListV5puppet/puppetlabs_apacheprior to 2.3.1

🔴Vulnerability Details

3
GHSA
GHSA-j433-wpfx-cxg3: Puppet Enterprise 20172022-05-13
OSV
CVE-2018-6508: Puppet Enterprise 20172018-02-09
CVEList
CVE-2018-6508: Puppet Enterprise 20172018-02-09

📋Vendor Advisories

2
Red Hat
puppet: Unparameterized input in multiple modules can allow a remote user to execute arbitrary code2018-02-05
Debian
CVE-2018-6508: puppet-module-puppetlabs-apache - Puppet Enterprise 2017.3.x prior to 2017.3.3 are vulnerable to a remote executio...2018

💬Community

1
Bugzilla
CVE-2018-6508 puppet: Unparameterized input in multiple modules can allow a remote user to execute arbitrary code2018-02-07
CVE-2018-6508 — Puppet Enterprise vulnerability | cvebase