// For flags

CVE-2018-6513

 

Severity Score

8.8
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Puppet Enterprise 2016.4.x prior to 2016.4.12, Puppet Enterprise 2017.3.x prior to 2017.3.7, Puppet Enterprise 2018.1.x prior to 2018.1.1, Puppet Agent 1.10.x prior to 1.10.13, Puppet Agent 5.3.x prior to 5.3.7, and Puppet Agent 5.5.x prior to 5.5.2, were vulnerable to an attack where an unprivileged user on Windows agents could write custom facts that can escalate privileges on the next puppet run. This was possible through the loading of shared libraries from untrusted paths.

Puppet Enterprise en versiones 2016.4.x anteriores a la 2016.4.12, Puppet Enterprise 2017.3.x anteriores a la 2017.3.7, Puppet Enterprise 2018.1.x anteriores a la 2018.1.1, Puppet Agent 1.10.x anteriores a la 1.10.13, Puppet Agent 5.3.x anteriores a la 5.3.7 y Puppet Agent 5.5.x anteriores a la 5.5.2 eran vulnerables a un ataque en el que un usuario sin privilegios en los agentes de Windows podía escribir hechos personalizados para poder escalar privilegios en la ejecución del siguiente puppet. Esto era posible mediante la carga de librerías compartidas desde rutas no fiables.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2018-02-01 CVE Reserved
  • 2018-06-11 CVE Published
  • 2023-03-07 EPSS Updated
  • 2024-09-17 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-426: Untrusted Search Path
CAPEC
References (1)
URL Tag Source
URL Date SRC
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Puppet
Search vendor "Puppet"
Puppet
Search vendor "Puppet" for product "Puppet"
>= 1.10.0 < 1.10.13
Search vendor "Puppet" for product "Puppet" and version " >= 1.10.0 < 1.10.13"
-
Affected
Puppet
Search vendor "Puppet"
Puppet
Search vendor "Puppet" for product "Puppet"
>= 5.3.0 < 5.3.7
Search vendor "Puppet" for product "Puppet" and version " >= 5.3.0 < 5.3.7"
-
Affected
Puppet
Search vendor "Puppet"
Puppet
Search vendor "Puppet" for product "Puppet"
>= 5.5.0 < 5.5.2
Search vendor "Puppet" for product "Puppet" and version " >= 5.5.0 < 5.5.2"
-
Affected
Puppet
Search vendor "Puppet"
Puppet Enterprise
Search vendor "Puppet" for product "Puppet Enterprise"
>= 2016.4.0 < 2016.4.12
Search vendor "Puppet" for product "Puppet Enterprise" and version " >= 2016.4.0 < 2016.4.12"
-
Affected
Puppet
Search vendor "Puppet"
Puppet Enterprise
Search vendor "Puppet" for product "Puppet Enterprise"
>= 2017.3.0 < 2017.3.7
Search vendor "Puppet" for product "Puppet Enterprise" and version " >= 2017.3.0 < 2017.3.7"
-
Affected
Puppet
Search vendor "Puppet"
Puppet Enterprise
Search vendor "Puppet" for product "Puppet Enterprise"
>= 2018.1.0 < 2018.1.1
Search vendor "Puppet" for product "Puppet Enterprise" and version " >= 2018.1.0 < 2018.1.1"
-
Affected