A flaw was found in the way puppet resource in --edit mode handled temporary files. It would use an extremely predictable file name which persisted and could be known well prior to creation. This could result in both editing an arbitrary target file, and tricking puppet into running that arbitrary file as the invoking user. This is feature is typically used as the root user, as you cannot do much as a less privileged user. This is corrected in upstream 2.6.11 and 2.7.5 releases.
Created attachment 525849 [details] patch from upstream for 2.6.x and 2.7.x
Created attachment 525850 [details] patch from upstream for 0.25.x
Created puppet tracking bugs for this issue Affects: fedora-all [bug 742654] Affects: epel-all [bug 742655]
puppet-0.25.5-2.el4 has been pushed to the Fedora EPEL 4 stable repository. If problems still persist, please make note of it in this bug report.
Resolved in Puppet 2.7.5 and 2.6.11, CloudForms ships Puppet 2.6.14.
Fixed upstream in 2.7.5 and 2.6.11. External Reference: http://puppetlabs.com/security/cve/cve-2011-3871/