On Windows only, with a specifically crafted configuration file an attacker could get Puppet PE client tools (aka pe-client-tools) 16.4.x prior to 16.4.6, 17.3.x prior to 17.3.6, and 18.1.x prior to 18.1.2 to load arbitrary code with privilege escalation.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Puppet_enterprise_client_tools | Puppet | 16.4.0 (including) | 16.4.6 (excluding) |
Puppet_enterprise_client_tools | Puppet | 17.3.0 (including) | 17.3.6 (excluding) |
Puppet_enterprise_client_tools | Puppet | 18.1.0 (including) | 18.1.2 (excluding) |
Puppet | Ubuntu | artful | * |
Puppet | Ubuntu | trusty | * |