CVE-2018-6508

NameCVE-2018-6508
DescriptionPuppet Enterprise 2017.3.x prior to 2017.3.3 are vulnerable to a remote execution bug when a specially crafted string was passed into the facter_task or puppet_conf tasks. This vulnerability only affects tasks in the affected modules, if you are not using puppet tasks you are not affected by this vulnerability.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
puppet-module-puppetlabs-apache (PTS)bookworm, bullseye5.5.0-2fixed
sid, trixie12.2.0-1fixed
puppet-module-puppetlabs-apt (PTS)bullseye6.1.1-1fixed
bookworm9.0.1-1fixed
sid, trixie9.4.0-1fixed
puppet-module-puppetlabs-mysql (PTS)bullseye8.1.0-5fixed
bookworm8.1.0-7fixed
sid, trixie15.0.0-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
puppet-module-puppetlabs-apachesource(unstable)3.0.0-1unimportant
puppet-module-puppetlabs-aptsource(unstable)4.5.1-1unimportant
puppet-module-puppetlabs-mysqlsource(unstable)5.3.0-1unimportant

Notes

https://puppet.com/security/cve/CVE-2018-6508
Issue in various puppet modules: facter_task, puppet_conf, apt, apache and mysql modules
https://github.com/puppetlabs/puppetlabs-facter_task/commit/dd37c72e78c8a37e671e20becb05d6ceafdbd81c
https://github.com/puppetlabs/puppetlabs-puppet_conf/commit/ba434605717e16d935cba45ab38ca5866780a36b
https://github.com/puppetlabs/puppetlabs-apt/commit/81879be960d5723016e3d0b4ff155ee704261bbc
https://github.com/puppetlabs/puppetlabs-apache/commit/81bc5119ceced1faa4bf261efa4b7cd3731ef3ef
https://github.com/puppetlabs/puppetlabs-mysql/commit/da3684c79d5fe6ece826e087e8693c75ac40414c
This is only exploitable with Puppet Tasks, which aren't packaged/available in Debian

Search for package or bug name: Reporting problems