The host is installed with Puppet 2.6.x before 2.6.18 or Puppet Enterprise 1.2.x before 1.2.7 and is prone to remote code-execution vulnerability. A flaw is present in the applications, which fail to handle a crafted request for a report. Successful exploitation allows remote authenticated users to execute arbitrary code on the puppet master, or an agent with puppet kick enabled.