CVE-2012-1053 (Local Group Privilege Escalation)
A bug in Puppet gives unexpected and improper group privileges to execs and types/providers.
When executing commands as a different user, Puppet leaves the forked process with Puppet’s own group permissions. Specifically:
- Puppet’s primary group (usually root) is always present in a process’s supplementary groups.
- When an `exec` resource has a specified `user` attribute but not a `group` attribute, Puppet will set its effective GID to Puppet’s own GID (usually root).
- Permanently changing a process’s UID and GID won’t clear the supplementary groups, leaving the process with Puppet’s own supplementary groups (usually including root).
This causes any untrusted code executed by a Puppet exec resource to be given unexpectedly high permissions.
- Resolved in Puppet 2.6.14 (source), 2.7.11 (source), rpm, deb
- Resolved in Puppet Enterprise 1.2.5 and 2.0.3
- Hotfixes available for Puppet Enterprise 1.0, 1.1, and 1.2.x