All the vulnerabilites related to Puppet - Puppet Enterprise
cve-2018-11749
Vulnerability from cvelistv5
Published
2018-08-24 13:00
Modified
2024-09-16 22:44
Severity ?
EPSS score ?
Summary
When users are configured to use startTLS with RBAC LDAP, at login time, the user's credentials are sent via plaintext to the LDAP server. This affects Puppet Enterprise 2018.1.3, 2017.3.9, and 2016.4.14, and is fixed in Puppet Enterprise 2018.1.4, 2017.3.10, and 2016.4.15. It scored an 8.5 CVSS score.
References
▼ | URL | Tags |
---|---|---|
https://puppet.com/security/cve/cve-2018-11749 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Puppet | Puppet Enterprise |
Version: 2018.1.3 Version: 2017.3.9 Version: 2016.4.14 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T08:17:09.058Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://puppet.com/security/cve/cve-2018-11749" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Puppet Enterprise", "vendor": "Puppet", "versions": [ { "status": "affected", "version": "2018.1.3" }, { "status": "affected", "version": "2017.3.9" }, { "status": "affected", "version": "2016.4.14" } ] } ], "datePublic": "2018-08-23T00:00:00", "descriptions": [ { "lang": "en", "value": "When users are configured to use startTLS with RBAC LDAP, at login time, the user\u0027s credentials are sent via plaintext to the LDAP server. This affects Puppet Enterprise 2018.1.3, 2017.3.9, and 2016.4.14, and is fixed in Puppet Enterprise 2018.1.4, 2017.3.10, and 2016.4.15. It scored an 8.5 CVSS score." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Authentication", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-08-24T12:57:01", "orgId": "ca2a266c-be2f-4d4b-92d0-47b76b1a9c4e", "shortName": "puppet" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://puppet.com/security/cve/cve-2018-11749" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@puppet.com", "DATE_PUBLIC": "2018-08-23T00:00:00", "ID": "CVE-2018-11749", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Puppet Enterprise", "version": { "version_data": [ { "version_value": "2018.1.3" }, { "version_value": "2017.3.9" }, { "version_value": "2016.4.14" } ] } } ] }, "vendor_name": "Puppet" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "When users are configured to use startTLS with RBAC LDAP, at login time, the user\u0027s credentials are sent via plaintext to the LDAP server. This affects Puppet Enterprise 2018.1.3, 2017.3.9, and 2016.4.14, and is fixed in Puppet Enterprise 2018.1.4, 2017.3.10, and 2016.4.15. It scored an 8.5 CVSS score." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Authentication" } ] } ] }, "references": { "reference_data": [ { "name": "https://puppet.com/security/cve/cve-2018-11749", "refsource": "CONFIRM", "url": "https://puppet.com/security/cve/cve-2018-11749" } ] } } } }, "cveMetadata": { "assignerOrgId": "ca2a266c-be2f-4d4b-92d0-47b76b1a9c4e", "assignerShortName": "puppet", "cveId": "CVE-2018-11749", "datePublished": "2018-08-24T13:00:00Z", "dateReserved": "2018-06-05T00:00:00", "dateUpdated": "2024-09-16T22:44:55.842Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-1894
Vulnerability from cvelistv5
Published
2023-05-04 22:13
Modified
2024-08-02 06:05
Severity ?
EPSS score ?
Summary
A Regular Expression Denial of Service (ReDoS) issue was discovered in Puppet Server 7.9.2 certificate validation. An issue related to specifically crafted certificate names significantly slowed down server operations.
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | Puppet | Puppet Enterprise |
Version: 2021.7.1 ≤ Version: 2023.0.0 ≤ |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T06:05:26.999Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.puppet.com/security/cve/cve-2023-1894-puppet-server-redos" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Puppet Enterprise", "vendor": "Puppet", "versions": [ { "lessThan": "2021.7.3", "status": "affected", "version": "2021.7.1", "versionType": "semver" }, { "lessThan": "2023.1.0", "status": "affected", "version": "2023.0.0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "Puppet Server", "vendor": "Puppet", "versions": [ { "lessThan": "7.11.0", "status": "affected", "version": "7.9.2", "versionType": "semver" }, { "lessThan": "8.0.0", "status": "affected", "version": "7.9.2", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "A Regular Expression Denial of Service (ReDoS) issue was discovered in Puppet Server 7.9.2 certificate validation. An issue related to specifically crafted certificate names significantly slowed down server operations." } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-1333 Inefficient Regular Expression Complexity", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-04T22:13:02.556Z", "orgId": "ca2a266c-be2f-4d4b-92d0-47b76b1a9c4e", "shortName": "puppet" }, "references": [ { "url": "https://www.puppet.com/security/cve/cve-2023-1894-puppet-server-redos" } ] } }, "cveMetadata": { "assignerOrgId": "ca2a266c-be2f-4d4b-92d0-47b76b1a9c4e", "assignerShortName": "puppet", "cveId": "CVE-2023-1894", "datePublished": "2023-05-04T22:13:02.556Z", "dateReserved": "2023-04-05T19:39:06.485Z", "dateUpdated": "2024-08-02T06:05:26.999Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-9686
Vulnerability from cvelistv5
Published
2017-02-08 22:00
Modified
2024-08-06 02:59
Severity ?
EPSS score ?
Summary
The Puppet Communications Protocol (PCP) Broker incorrectly validates message header sizes. An attacker could use this to crash the PCP Broker, preventing commands from being sent to agents. This is resolved in Puppet Enterprise 2016.4.3 and 2016.5.2.
References
▼ | URL | Tags |
---|---|---|
https://puppet.com/security/cve/cve-2016-9686 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Puppet | Puppet Enterprise |
Version: 2015.3.x Version: 2016.x prior to 2016.4.3 Version: 2016.5.1. |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T02:59:03.352Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://puppet.com/security/cve/cve-2016-9686" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Puppet Enterprise", "vendor": "Puppet", "versions": [ { "status": "affected", "version": "2015.3.x" }, { "status": "affected", "version": "2016.x prior to 2016.4.3" }, { "status": "affected", "version": "2016.5.1." } ] } ], "datePublic": "2017-02-07T00:00:00", "descriptions": [ { "lang": "en", "value": "The Puppet Communications Protocol (PCP) Broker incorrectly validates message header sizes. An attacker could use this to crash the PCP Broker, preventing commands from being sent to agents. This is resolved in Puppet Enterprise 2016.4.3 and 2016.5.2." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-02-08T21:57:01", "orgId": "ca2a266c-be2f-4d4b-92d0-47b76b1a9c4e", "shortName": "puppet" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://puppet.com/security/cve/cve-2016-9686" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@puppet.com", "ID": "CVE-2016-9686", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Puppet Enterprise", "version": { "version_data": [ { "version_value": "2015.3.x" }, { "version_value": "2016.x prior to 2016.4.3" }, { "version_value": "2016.5.1." } ] } } ] }, "vendor_name": "Puppet" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Puppet Communications Protocol (PCP) Broker incorrectly validates message header sizes. An attacker could use this to crash the PCP Broker, preventing commands from being sent to agents. This is resolved in Puppet Enterprise 2016.4.3 and 2016.5.2." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "https://puppet.com/security/cve/cve-2016-9686", "refsource": "CONFIRM", "url": "https://puppet.com/security/cve/cve-2016-9686" } ] } } } }, "cveMetadata": { "assignerOrgId": "ca2a266c-be2f-4d4b-92d0-47b76b1a9c4e", "assignerShortName": "puppet", "cveId": "CVE-2016-9686", "datePublished": "2017-02-08T22:00:00", "dateReserved": "2016-11-30T00:00:00", "dateUpdated": "2024-08-06T02:59:03.352Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-2294
Vulnerability from cvelistv5
Published
2017-07-05 15:00
Modified
2024-09-17 02:20
Severity ?
EPSS score ?
Summary
Versions of Puppet Enterprise prior to 2016.4.5 or 2017.2.1 failed to mark MCollective server private keys as sensitive (a feature added in Puppet 4.6), so key values could be logged and stored in PuppetDB. These releases use the sensitive data type to ensure this won't happen anymore.
References
▼ | URL | Tags |
---|---|---|
https://puppet.com/security/cve/cve-2017-2294 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Puppet | Puppet Enterprise |
Version: PE prior to 2016.4.5 or 2017.2.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T13:48:05.183Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://puppet.com/security/cve/cve-2017-2294" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Puppet Enterprise", "vendor": "Puppet", "versions": [ { "status": "affected", "version": "PE prior to 2016.4.5 or 2017.2.1" } ] } ], "datePublic": "2017-05-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Versions of Puppet Enterprise prior to 2016.4.5 or 2017.2.1 failed to mark MCollective server private keys as sensitive (a feature added in Puppet 4.6), so key values could be logged and stored in PuppetDB. These releases use the sensitive data type to ensure this won\u0027t happen anymore." } ], "problemTypes": [ { "descriptions": [ { "description": "client private keys insufficiently protected", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-05T14:57:01", "orgId": "ca2a266c-be2f-4d4b-92d0-47b76b1a9c4e", "shortName": "puppet" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://puppet.com/security/cve/cve-2017-2294" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@puppet.com", "DATE_PUBLIC": "2017-05-11T00:00:00", "ID": "CVE-2017-2294", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Puppet Enterprise", "version": { "version_data": [ { "version_value": "PE prior to 2016.4.5 or 2017.2.1" } ] } } ] }, "vendor_name": "Puppet" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Versions of Puppet Enterprise prior to 2016.4.5 or 2017.2.1 failed to mark MCollective server private keys as sensitive (a feature added in Puppet 4.6), so key values could be logged and stored in PuppetDB. These releases use the sensitive data type to ensure this won\u0027t happen anymore." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "client private keys insufficiently protected" } ] } ] }, "references": { "reference_data": [ { "name": "https://puppet.com/security/cve/cve-2017-2294", "refsource": "CONFIRM", "url": "https://puppet.com/security/cve/cve-2017-2294" } ] } } } }, "cveMetadata": { "assignerOrgId": "ca2a266c-be2f-4d4b-92d0-47b76b1a9c4e", "assignerShortName": "puppet", "cveId": "CVE-2017-2294", "datePublished": "2017-07-05T15:00:00Z", "dateReserved": "2016-12-01T00:00:00", "dateUpdated": "2024-09-17T02:20:34.679Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-5255
Vulnerability from cvelistv5
Published
2023-10-03 17:54
Modified
2024-09-19 19:29
Severity ?
EPSS score ?
Summary
Denial of Service for Revocation of Auto Renewed Certificates
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Puppet | Puppet Enterprise |
Version: Puppet Enterprise 2023.3 ≤ 2023.4 Version: Puppet Server 8.2.0 ≤ 8.2.3 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T07:52:08.537Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.puppet.com/security/cve/cve-2023-5255-denial-service-revocation-auto-renewed-certificates" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-5255", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-19T19:29:18.354543Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-19T19:29:30.230Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "Puppet Server", "product": "Puppet Enterprise", "vendor": "Puppet", "versions": [ { "lessThanOrEqual": "2023.4", "status": "affected", "version": "Puppet Enterprise 2023.3", "versionType": "semver" }, { "lessThanOrEqual": "8.2.3", "status": "affected", "version": "Puppet Server 8.2.0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "For certificates that utilize the auto-renew feature in Puppet Server, a flaw exists which prevents the certificates from being revoked. " } ], "value": "For certificates that utilize the auto-renew feature in Puppet Server, a flaw exists which prevents the certificates from being revoked. " } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-404", "description": "CWE-404 Improper Resource Shutdown or Release", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-03T22:38:41.221Z", "orgId": "ca2a266c-be2f-4d4b-92d0-47b76b1a9c4e", "shortName": "puppet" }, "references": [ { "url": "https://www.puppet.com/security/cve/cve-2023-5255-denial-service-revocation-auto-renewed-certificates" } ], "source": { "discovery": "UNKNOWN" }, "title": "Denial of Service for Revocation of Auto Renewed Certificates", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "ca2a266c-be2f-4d4b-92d0-47b76b1a9c4e", "assignerShortName": "puppet", "cveId": "CVE-2023-5255", "datePublished": "2023-10-03T17:54:55.177Z", "dateReserved": "2023-09-28T17:42:16.370Z", "dateUpdated": "2024-09-19T19:29:30.230Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-6510
Vulnerability from cvelistv5
Published
2018-05-08 18:00
Modified
2024-09-16 17:37
Severity ?
EPSS score ?
Summary
XSS Vulnerability in Puppet Enterprise Console
References
▼ | URL | Tags |
---|---|---|
https://puppet.com/security/cve/CVE-2018-6510 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Puppet | Puppet Enterprise |
Version: 2017.3.x < 2017.3.6 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T06:10:10.399Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://puppet.com/security/cve/CVE-2018-6510" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Puppet Enterprise", "vendor": "Puppet", "versions": [ { "lessThan": "2017.3.6", "status": "affected", "version": "2017.3.x", "versionType": "custom" } ] } ], "datePublic": "2018-05-01T00:00:00", "descriptions": [ { "lang": "en", "value": "A cross-site scripting vulnerability in Puppet Enterprise Console of Puppet Enterprise allows a user to inject scripts into the Puppet Enterprise Console when using the Orchestrator. Affected releases are Puppet Puppet Enterprise: 2017.3.x versions prior to 2017.3.6." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "Cross-site scripting", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-05-08T17:57:01", "orgId": "ca2a266c-be2f-4d4b-92d0-47b76b1a9c4e", "shortName": "puppet" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://puppet.com/security/cve/CVE-2018-6510" } ], "source": { "discovery": "UNKNOWN" }, "title": "XSS Vulnerability in Puppet Enterprise Console", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@puppet.com", "DATE_PUBLIC": "2018-05-01T13:00:00.000Z", "ID": "CVE-2018-6510", "STATE": "PUBLIC", "TITLE": "XSS Vulnerability in Puppet Enterprise Console" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Puppet Enterprise", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_name": "2017.3.x", "version_value": "2017.3.6" } ] } } ] }, "vendor_name": "Puppet" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A cross-site scripting vulnerability in Puppet Enterprise Console of Puppet Enterprise allows a user to inject scripts into the Puppet Enterprise Console when using the Orchestrator. Affected releases are Puppet Puppet Enterprise: 2017.3.x versions prior to 2017.3.6." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cross-site scripting" } ] } ] }, "references": { "reference_data": [ { "name": "https://puppet.com/security/cve/CVE-2018-6510", "refsource": "CONFIRM", "url": "https://puppet.com/security/cve/CVE-2018-6510" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "ca2a266c-be2f-4d4b-92d0-47b76b1a9c4e", "assignerShortName": "puppet", "cveId": "CVE-2018-6510", "datePublished": "2018-05-08T18:00:00Z", "dateReserved": "2018-02-01T00:00:00", "dateUpdated": "2024-09-16T17:37:42.972Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-10690
Vulnerability from cvelistv5
Published
2018-02-09 20:00
Modified
2024-09-16 17:49
Severity ?
EPSS score ?
Summary
In previous versions of Puppet Agent it was possible for the agent to retrieve facts from an environment that it was not classified to retrieve from. This was resolved in Puppet Agent 5.3.4, included in Puppet Enterprise 2017.3.4
References
▼ | URL | Tags |
---|---|---|
https://access.redhat.com/errata/RHSA-2018:2927 | vendor-advisory, x_refsource_REDHAT | |
https://puppet.com/security/cve/CVE-2017-10690 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | Puppet | Puppet Enterprise |
Version: 2017.3.x prior to 2017.3.4 |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T17:41:55.656Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2018:2927", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2927" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://puppet.com/security/cve/CVE-2017-10690" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Puppet Enterprise", "vendor": "Puppet", "versions": [ { "status": "affected", "version": "2017.3.x prior to 2017.3.4" } ] }, { "product": "Puppet Agent", "vendor": "Puppet", "versions": [ { "status": "affected", "version": "5.x prior to 5.3.4" } ] } ], "datePublic": "2018-02-05T00:00:00", "descriptions": [ { "lang": "en", "value": "In previous versions of Puppet Agent it was possible for the agent to retrieve facts from an environment that it was not classified to retrieve from. This was resolved in Puppet Agent 5.3.4, included in Puppet Enterprise 2017.3.4" } ], "problemTypes": [ { "descriptions": [ { "description": "Privilege Escalation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-17T09:57:01", "orgId": "ca2a266c-be2f-4d4b-92d0-47b76b1a9c4e", "shortName": "puppet" }, "references": [ { "name": "RHSA-2018:2927", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2927" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://puppet.com/security/cve/CVE-2017-10690" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@puppet.com", "DATE_PUBLIC": "2018-02-05T00:00:00", "ID": "CVE-2017-10690", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Puppet Enterprise", "version": { "version_data": [ { "version_value": "2017.3.x prior to 2017.3.4" } ] } }, { "product_name": "Puppet Agent", "version": { "version_data": [ { "version_value": "5.x prior to 5.3.4" } ] } } ] }, "vendor_name": "Puppet" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In previous versions of Puppet Agent it was possible for the agent to retrieve facts from an environment that it was not classified to retrieve from. This was resolved in Puppet Agent 5.3.4, included in Puppet Enterprise 2017.3.4" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Privilege Escalation" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2018:2927", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2927" }, { "name": "https://puppet.com/security/cve/CVE-2017-10690", "refsource": "CONFIRM", "url": "https://puppet.com/security/cve/CVE-2017-10690" } ] } } } }, "cveMetadata": { "assignerOrgId": "ca2a266c-be2f-4d4b-92d0-47b76b1a9c4e", "assignerShortName": "puppet", "cveId": "CVE-2017-10690", "datePublished": "2018-02-09T20:00:00Z", "dateReserved": "2017-06-29T00:00:00", "dateUpdated": "2024-09-16T17:49:12.591Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-2293
Vulnerability from cvelistv5
Published
2018-02-01 22:00
Modified
2024-09-16 17:33
Severity ?
EPSS score ?
Summary
Versions of Puppet Enterprise prior to 2016.4.5 or 2017.2.1 shipped with an MCollective configuration that allowed the package plugin to install or remove arbitrary packages on all managed agents. This release adds default configuration to not allow these actions. Customers who rely on this functionality can change this policy.
References
▼ | URL | Tags |
---|---|---|
https://puppet.com/security/cve/cve-2017-2293 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Puppet | Puppet Enterprise |
Version: prior to 2016.4.5, 2016.5.x, 2017.1.x, resolved in 2016.4.5 and 2017.2.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T13:48:05.238Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://puppet.com/security/cve/cve-2017-2293" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Puppet Enterprise", "vendor": "Puppet", "versions": [ { "status": "affected", "version": "prior to 2016.4.5, 2016.5.x, 2017.1.x, resolved in 2016.4.5 and 2017.2.1" } ] } ], "datePublic": "2018-02-01T00:00:00", "descriptions": [ { "lang": "en", "value": "Versions of Puppet Enterprise prior to 2016.4.5 or 2017.2.1 shipped with an MCollective configuration that allowed the package plugin to install or remove arbitrary packages on all managed agents. This release adds default configuration to not allow these actions. Customers who rely on this functionality can change this policy." } ], "problemTypes": [ { "descriptions": [ { "description": "Privilege Escalation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-02-01T21:57:01", "orgId": "ca2a266c-be2f-4d4b-92d0-47b76b1a9c4e", "shortName": "puppet" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://puppet.com/security/cve/cve-2017-2293" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@puppet.com", "DATE_PUBLIC": "2018-02-01T00:00:00", "ID": "CVE-2017-2293", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Puppet Enterprise", "version": { "version_data": [ { "version_value": "prior to 2016.4.5, 2016.5.x, 2017.1.x, resolved in 2016.4.5 and 2017.2.1" } ] } } ] }, "vendor_name": "Puppet" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Versions of Puppet Enterprise prior to 2016.4.5 or 2017.2.1 shipped with an MCollective configuration that allowed the package plugin to install or remove arbitrary packages on all managed agents. This release adds default configuration to not allow these actions. Customers who rely on this functionality can change this policy." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Privilege Escalation" } ] } ] }, "references": { "reference_data": [ { "name": "https://puppet.com/security/cve/cve-2017-2293", "refsource": "CONFIRM", "url": "https://puppet.com/security/cve/cve-2017-2293" } ] } } } }, "cveMetadata": { "assignerOrgId": "ca2a266c-be2f-4d4b-92d0-47b76b1a9c4e", "assignerShortName": "puppet", "cveId": "CVE-2017-2293", "datePublished": "2018-02-01T22:00:00Z", "dateReserved": "2016-12-01T00:00:00", "dateUpdated": "2024-09-16T17:33:31.679Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-10689
Vulnerability from cvelistv5
Published
2018-02-09 20:00
Modified
2024-09-17 00:20
Severity ?
EPSS score ?
Summary
In previous versions of Puppet Agent it was possible to install a module with world writable permissions. Puppet Agent 5.3.4 and 1.10.10 included a fix to this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://usn.ubuntu.com/3567-1/ | vendor-advisory, x_refsource_UBUNTU | |
https://puppet.com/security/cve/CVE-2017-10689 | x_refsource_CONFIRM | |
https://access.redhat.com/errata/RHSA-2018:2927 | vendor-advisory, x_refsource_REDHAT |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | Puppet | Puppet Enterprise |
Version: prior to 2016.4.10 or 2017.3.4 |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T17:41:55.627Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-3567-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3567-1/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://puppet.com/security/cve/CVE-2017-10689" }, { "name": "RHSA-2018:2927", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2927" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Puppet Enterprise", "vendor": "Puppet", "versions": [ { "status": "affected", "version": "prior to 2016.4.10 or 2017.3.4" } ] }, { "product": "Puppet Agent", "vendor": "Puppet", "versions": [ { "status": "affected", "version": "prior to 5.3.4 or 1.10.10" } ] } ], "datePublic": "2018-02-05T00:00:00", "descriptions": [ { "lang": "en", "value": "In previous versions of Puppet Agent it was possible to install a module with world writable permissions. Puppet Agent 5.3.4 and 1.10.10 included a fix to this vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "Incorrect Permission Handling", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-17T09:57:01", "orgId": "ca2a266c-be2f-4d4b-92d0-47b76b1a9c4e", "shortName": "puppet" }, "references": [ { "name": "USN-3567-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3567-1/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://puppet.com/security/cve/CVE-2017-10689" }, { "name": "RHSA-2018:2927", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2927" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@puppet.com", "DATE_PUBLIC": "2018-02-05T00:00:00", "ID": "CVE-2017-10689", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Puppet Enterprise", "version": { "version_data": [ { "version_value": "prior to 2016.4.10 or 2017.3.4" } ] } }, { "product_name": "Puppet Agent", "version": { "version_data": [ { "version_value": "prior to 5.3.4 or 1.10.10" } ] } } ] }, "vendor_name": "Puppet" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In previous versions of Puppet Agent it was possible to install a module with world writable permissions. Puppet Agent 5.3.4 and 1.10.10 included a fix to this vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Incorrect Permission Handling" } ] } ] }, "references": { "reference_data": [ { "name": "USN-3567-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3567-1/" }, { "name": "https://puppet.com/security/cve/CVE-2017-10689", "refsource": "CONFIRM", "url": "https://puppet.com/security/cve/CVE-2017-10689" }, { "name": "RHSA-2018:2927", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2927" } ] } } } }, "cveMetadata": { "assignerOrgId": "ca2a266c-be2f-4d4b-92d0-47b76b1a9c4e", "assignerShortName": "puppet", "cveId": "CVE-2017-10689", "datePublished": "2018-02-09T20:00:00Z", "dateReserved": "2017-06-29T00:00:00", "dateUpdated": "2024-09-17T00:20:43.149Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-5716
Vulnerability from cvelistv5
Published
2017-08-09 14:00
Modified
2024-09-16 23:46
Severity ?
EPSS score ?
Summary
The console in Puppet Enterprise 2015.x and 2016.x prior to 2016.4.0 includes unsafe string reads that potentially allows for remote code execution on the console node.
References
▼ | URL | Tags |
---|---|---|
https://puppet.com/security/cve/pe-console-oct-2016 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Puppet | Puppet Enterprise |
Version: PE < 2016.4.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T01:07:59.986Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://puppet.com/security/cve/pe-console-oct-2016" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Puppet Enterprise", "vendor": "Puppet", "versions": [ { "status": "affected", "version": "PE \u003c 2016.4.0" } ] } ], "datePublic": "2016-10-20T00:00:00", "descriptions": [ { "lang": "en", "value": "The console in Puppet Enterprise 2015.x and 2016.x prior to 2016.4.0 includes unsafe string reads that potentially allows for remote code execution on the console node." } ], "problemTypes": [ { "descriptions": [ { "description": "RCE", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-09T12:57:01", "orgId": "ca2a266c-be2f-4d4b-92d0-47b76b1a9c4e", "shortName": "puppet" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://puppet.com/security/cve/pe-console-oct-2016" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@puppet.com", "DATE_PUBLIC": "2016-10-20T00:00:00", "ID": "CVE-2016-5716", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Puppet Enterprise", "version": { "version_data": [ { "version_value": "PE \u003c 2016.4.0" } ] } } ] }, "vendor_name": "Puppet" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The console in Puppet Enterprise 2015.x and 2016.x prior to 2016.4.0 includes unsafe string reads that potentially allows for remote code execution on the console node." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "RCE" } ] } ] }, "references": { "reference_data": [ { "name": "https://puppet.com/security/cve/pe-console-oct-2016", "refsource": "CONFIRM", "url": "https://puppet.com/security/cve/pe-console-oct-2016" } ] } } } }, "cveMetadata": { "assignerOrgId": "ca2a266c-be2f-4d4b-92d0-47b76b1a9c4e", "assignerShortName": "puppet", "cveId": "CVE-2016-5716", "datePublished": "2017-08-09T14:00:00Z", "dateReserved": "2016-06-16T00:00:00", "dateUpdated": "2024-09-16T23:46:30.239Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-2296
Vulnerability from cvelistv5
Published
2018-02-01 22:00
Modified
2024-09-17 03:48
Severity ?
EPSS score ?
Summary
In Puppet Enterprise 2017.1.x and 2017.2.1, using specially formatted strings with certain formatting characters as Classifier node group names or RBAC role display names causes errors, effectively causing a DOS to the service. This was resolved in Puppet Enterprise 2017.2.2.
References
▼ | URL | Tags |
---|---|---|
https://puppet.com/security/cve/cve-2017-2296 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Puppet | Puppet Enterprise |
Version: 2017.1.x, 2017.2.1. Fixed in 2017.2.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T13:48:05.317Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://puppet.com/security/cve/cve-2017-2296" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Puppet Enterprise", "vendor": "Puppet", "versions": [ { "status": "affected", "version": "2017.1.x, 2017.2.1. Fixed in 2017.2.2" } ] } ], "datePublic": "2018-02-01T00:00:00", "descriptions": [ { "lang": "en", "value": "In Puppet Enterprise 2017.1.x and 2017.2.1, using specially formatted strings with certain formatting characters as Classifier node group names or RBAC role display names causes errors, effectively causing a DOS to the service. This was resolved in Puppet Enterprise 2017.2.2." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-02-01T21:57:01", "orgId": "ca2a266c-be2f-4d4b-92d0-47b76b1a9c4e", "shortName": "puppet" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://puppet.com/security/cve/cve-2017-2296" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@puppet.com", "DATE_PUBLIC": "2018-02-01T00:00:00", "ID": "CVE-2017-2296", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Puppet Enterprise", "version": { "version_data": [ { "version_value": "2017.1.x, 2017.2.1. Fixed in 2017.2.2" } ] } } ] }, "vendor_name": "Puppet" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Puppet Enterprise 2017.1.x and 2017.2.1, using specially formatted strings with certain formatting characters as Classifier node group names or RBAC role display names causes errors, effectively causing a DOS to the service. This was resolved in Puppet Enterprise 2017.2.2." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "https://puppet.com/security/cve/cve-2017-2296", "refsource": "CONFIRM", "url": "https://puppet.com/security/cve/cve-2017-2296" } ] } } } }, "cveMetadata": { "assignerOrgId": "ca2a266c-be2f-4d4b-92d0-47b76b1a9c4e", "assignerShortName": "puppet", "cveId": "CVE-2017-2296", "datePublished": "2018-02-01T22:00:00Z", "dateReserved": "2016-12-01T00:00:00", "dateUpdated": "2024-09-17T03:48:29.424Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-2297
Vulnerability from cvelistv5
Published
2018-02-01 22:00
Modified
2024-09-17 00:56
Severity ?
EPSS score ?
Summary
Puppet Enterprise versions prior to 2016.4.5 and 2017.2.1 did not correctly authenticate users before returning labeled RBAC access tokens. This issue has been fixed in Puppet Enterprise 2016.4.5 and 2017.2.1. This only affects users with labeled tokens, which is not the default for tokens.
References
▼ | URL | Tags |
---|---|---|
https://puppet.com/security/cve/cve-2017-2297 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Puppet | Puppet Enterprise |
Version: 2016.4.x prior to 2016.4.5, 2016.5.x, 2017.1.x |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T13:48:05.263Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://puppet.com/security/cve/cve-2017-2297" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Puppet Enterprise", "vendor": "Puppet", "versions": [ { "status": "affected", "version": "2016.4.x prior to 2016.4.5, 2016.5.x, 2017.1.x" } ] } ], "datePublic": "2018-02-01T00:00:00", "descriptions": [ { "lang": "en", "value": "Puppet Enterprise versions prior to 2016.4.5 and 2017.2.1 did not correctly authenticate users before returning labeled RBAC access tokens. This issue has been fixed in Puppet Enterprise 2016.4.5 and 2017.2.1. This only affects users with labeled tokens, which is not the default for tokens." } ], "problemTypes": [ { "descriptions": [ { "description": "Authentication Bypass", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-02-01T21:57:01", "orgId": "ca2a266c-be2f-4d4b-92d0-47b76b1a9c4e", "shortName": "puppet" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://puppet.com/security/cve/cve-2017-2297" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@puppet.com", "DATE_PUBLIC": "2018-02-01T00:00:00", "ID": "CVE-2017-2297", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Puppet Enterprise", "version": { "version_data": [ { "version_value": "2016.4.x prior to 2016.4.5, 2016.5.x, 2017.1.x" } ] } } ] }, "vendor_name": "Puppet" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Puppet Enterprise versions prior to 2016.4.5 and 2017.2.1 did not correctly authenticate users before returning labeled RBAC access tokens. This issue has been fixed in Puppet Enterprise 2016.4.5 and 2017.2.1. This only affects users with labeled tokens, which is not the default for tokens." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Authentication Bypass" } ] } ] }, "references": { "reference_data": [ { "name": "https://puppet.com/security/cve/cve-2017-2297", "refsource": "CONFIRM", "url": "https://puppet.com/security/cve/cve-2017-2297" } ] } } } }, "cveMetadata": { "assignerOrgId": "ca2a266c-be2f-4d4b-92d0-47b76b1a9c4e", "assignerShortName": "puppet", "cveId": "CVE-2017-2297", "datePublished": "2018-02-01T22:00:00Z", "dateReserved": "2016-12-01T00:00:00", "dateUpdated": "2024-09-17T00:56:12.336Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-5309
Vulnerability from cvelistv5
Published
2023-11-07 19:01
Modified
2024-09-04 19:03
Severity ?
EPSS score ?
Summary
Broken Session Management in Puppet Enterprise
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Puppet | Puppet Enterprise |
Version: 2021.7.0 ≤ Version: 2023.0.0 ≤ |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T07:52:08.624Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.puppet.com/security/cve/cve-2023-5309-broken-session-management-puppet-enterprise" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-5309", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T19:02:59.709462Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T19:03:16.727Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Puppet Enterprise", "vendor": "Puppet", "versions": [ { "lessThan": "2021.7.6", "status": "affected", "version": "2021.7.0", "versionType": "semver" }, { "lessThan": "2023.5", "status": "affected", "version": "2023.0.0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eVersions of Puppet Enterprise prior to \u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e2021.7.6 and 2023.5\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u0026nbsp;contain \u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003ea flaw which results in broken session management for SAML implementations. \u003c/span\u003e\u003cbr\u003e" } ], "value": "Versions of Puppet Enterprise prior to 2021.7.6 and 2023.5\u00a0contain a flaw which results in broken session management for SAML implementations. \n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-384", "description": "CWE-384 Session Fixation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-07T19:01:17.138Z", "orgId": "ca2a266c-be2f-4d4b-92d0-47b76b1a9c4e", "shortName": "Perforce" }, "references": [ { "url": "https://www.puppet.com/security/cve/cve-2023-5309-broken-session-management-puppet-enterprise" } ], "source": { "discovery": "UNKNOWN" }, "title": "Broken Session Management in Puppet Enterprise", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "ca2a266c-be2f-4d4b-92d0-47b76b1a9c4e", "assignerShortName": "Perforce", "cveId": "CVE-2023-5309", "datePublished": "2023-11-07T19:01:05.041Z", "dateReserved": "2023-09-29T18:16:55.826Z", "dateUpdated": "2024-09-04T19:03:16.727Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-2530
Vulnerability from cvelistv5
Published
2023-06-07 00:00
Modified
2024-08-02 06:26
Severity ?
EPSS score ?
Summary
A privilege escalation allowing remote code execution was discovered in the orchestration service.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Puppet | Puppet Enterprise |
Version: 2021.7.0 ≤ Version: 2023.0.0 ≤ |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T06:26:09.676Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.puppet.com/security/cve/cve-2023-2530-remote-code-execution-orchestrator" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Puppet Enterprise", "vendor": "Puppet", "versions": [ { "lessThan": "2021.7.4", "status": "affected", "version": "2021.7.0", "versionType": "semver" }, { "lessThan": "2023.2.0", "status": "affected", "version": "2023.0.0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "A privilege escalation allowing remote code execution was discovered in the orchestration service." } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-284 Improper Access Control", "lang": "en" } ] } ], "providerMetadata": { "orgId": "ca2a266c-be2f-4d4b-92d0-47b76b1a9c4e" }, "references": [ { "url": "https://www.puppet.com/security/cve/cve-2023-2530-remote-code-execution-orchestrator" } ] } }, "cveMetadata": { "assignerOrgId": "ca2a266c-be2f-4d4b-92d0-47b76b1a9c4e", "cveId": "CVE-2023-2530", "datePublished": "2023-06-07T00:00:00", "dateReserved": "2023-05-04T00:00:00", "dateUpdated": "2024-08-02T06:26:09.676Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-6511
Vulnerability from cvelistv5
Published
2018-05-08 18:00
Modified
2024-09-16 20:32
Severity ?
EPSS score ?
Summary
XSS Vulnerability in Puppet Enterprise Console
References
▼ | URL | Tags |
---|---|---|
https://puppet.com/security/cve/CVE-2018-6511 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Puppet | Puppet Enterprise |
Version: 2017.3.x < 2017.3.6 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T06:10:10.180Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://puppet.com/security/cve/CVE-2018-6511" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Puppet Enterprise", "vendor": "Puppet", "versions": [ { "lessThan": "2017.3.6", "status": "affected", "version": "2017.3.x", "versionType": "custom" } ] } ], "datePublic": "2018-05-01T00:00:00", "descriptions": [ { "lang": "en", "value": "A cross-site scripting vulnerability in Puppet Enterprise Console of Puppet Enterprise allows a user to inject scripts into the Puppet Enterprise Console when using the Puppet Enterprise Console. Affected releases are Puppet Puppet Enterprise: 2017.3.x versions prior to 2017.3.6." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "Cross-site scripting", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-05-08T17:57:01", "orgId": "ca2a266c-be2f-4d4b-92d0-47b76b1a9c4e", "shortName": "puppet" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://puppet.com/security/cve/CVE-2018-6511" } ], "source": { "discovery": "UNKNOWN" }, "title": "XSS Vulnerability in Puppet Enterprise Console", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@puppet.com", "DATE_PUBLIC": "2018-05-01T13:00:00.000Z", "ID": "CVE-2018-6511", "STATE": "PUBLIC", "TITLE": "XSS Vulnerability in Puppet Enterprise Console" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Puppet Enterprise", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_name": "2017.3.x", "version_value": "2017.3.6" } ] } } ] }, "vendor_name": "Puppet" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A cross-site scripting vulnerability in Puppet Enterprise Console of Puppet Enterprise allows a user to inject scripts into the Puppet Enterprise Console when using the Puppet Enterprise Console. Affected releases are Puppet Puppet Enterprise: 2017.3.x versions prior to 2017.3.6." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cross-site scripting" } ] } ] }, "references": { "reference_data": [ { "name": "https://puppet.com/security/cve/CVE-2018-6511", "refsource": "CONFIRM", "url": "https://puppet.com/security/cve/CVE-2018-6511" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "ca2a266c-be2f-4d4b-92d0-47b76b1a9c4e", "assignerShortName": "puppet", "cveId": "CVE-2018-6511", "datePublished": "2018-05-08T18:00:00Z", "dateReserved": "2018-02-01T00:00:00", "dateUpdated": "2024-09-16T20:32:57.469Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-6508
Vulnerability from cvelistv5
Published
2018-02-09 20:00
Modified
2024-09-17 01:55
Severity ?
EPSS score ?
Summary
Puppet Enterprise 2017.3.x prior to 2017.3.3 are vulnerable to a remote execution bug when a specially crafted string was passed into the facter_task or puppet_conf tasks. This vulnerability only affects tasks in the affected modules, if you are not using puppet tasks you are not affected by this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://puppet.com/security/cve/CVE-2018-6508 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/103020 | vdb-entry, x_refsource_BID |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Puppet | Puppet Enterprise |
Version: 2017.3.x prior to 2017.3.4 |
||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T06:10:10.157Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://puppet.com/security/cve/CVE-2018-6508" }, { "name": "103020", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103020" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Puppet Enterprise", "vendor": "Puppet", "versions": [ { "status": "affected", "version": "2017.3.x prior to 2017.3.4" } ] }, { "product": "puppetlabs/facter_task", "vendor": "Puppet", "versions": [ { "status": "affected", "version": "prior to 0.1.5" } ] }, { "product": "puppetlabs/puppet_conf", "vendor": "Puppet", "versions": [ { "status": "affected", "version": "prior to 0.1.5" } ] }, { "product": "puppetlabs/apt", "vendor": "Puppet", "versions": [ { "status": "affected", "version": "prior to 4.5.1" } ] }, { "product": "puppetlabs/mysql", "vendor": "Puppet", "versions": [ { "status": "affected", "version": "prior to 5.2.1" } ] }, { "product": "puppetlabs/apache", "vendor": "Puppet", "versions": [ { "status": "affected", "version": "prior to 2.3.1" } ] } ], "datePublic": "2018-02-05T00:00:00", "descriptions": [ { "lang": "en", "value": "Puppet Enterprise 2017.3.x prior to 2017.3.3 are vulnerable to a remote execution bug when a specially crafted string was passed into the facter_task or puppet_conf tasks. This vulnerability only affects tasks in the affected modules, if you are not using puppet tasks you are not affected by this vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "Remote Code Execution", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-02-15T10:57:01", "orgId": "ca2a266c-be2f-4d4b-92d0-47b76b1a9c4e", "shortName": "puppet" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://puppet.com/security/cve/CVE-2018-6508" }, { "name": "103020", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103020" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@puppet.com", "DATE_PUBLIC": "2018-02-05T00:00:00", "ID": "CVE-2018-6508", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Puppet Enterprise", "version": { "version_data": [ { "version_value": "2017.3.x prior to 2017.3.4" } ] } }, { "product_name": "puppetlabs/facter_task", "version": { "version_data": [ { "version_value": "prior to 0.1.5" } ] } }, { "product_name": "puppetlabs/puppet_conf", "version": { "version_data": [ { "version_value": "prior to 0.1.5" } ] } }, { "product_name": "puppetlabs/apt", "version": { "version_data": [ { "version_value": "prior to 4.5.1" } ] } }, { "product_name": "puppetlabs/mysql", "version": { "version_data": [ { "version_value": "prior to 5.2.1" } ] } }, { "product_name": "puppetlabs/apache", "version": { "version_data": [ { "version_value": "prior to 2.3.1" } ] } } ] }, "vendor_name": "Puppet" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Puppet Enterprise 2017.3.x prior to 2017.3.3 are vulnerable to a remote execution bug when a specially crafted string was passed into the facter_task or puppet_conf tasks. This vulnerability only affects tasks in the affected modules, if you are not using puppet tasks you are not affected by this vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Remote Code Execution" } ] } ] }, "references": { "reference_data": [ { "name": "https://puppet.com/security/cve/CVE-2018-6508", "refsource": "CONFIRM", "url": "https://puppet.com/security/cve/CVE-2018-6508" }, { "name": "103020", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103020" } ] } } } }, "cveMetadata": { "assignerOrgId": "ca2a266c-be2f-4d4b-92d0-47b76b1a9c4e", "assignerShortName": "puppet", "cveId": "CVE-2018-6508", "datePublished": "2018-02-09T20:00:00Z", "dateReserved": "2018-02-01T00:00:00", "dateUpdated": "2024-09-17T01:55:41.774Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }