Description
PuppetDB logging included potentially sensitive system information.
Affected Package
Related
{"id": "DEBIANCVE:CVE-2021-27019", "vendorId": null, "type": "debiancve", "bulletinFamily": "info", "title": "CVE-2021-27019", "description": "PuppetDB logging included potentially sensitive system information.", "published": "2021-08-30T18:15:00", "modified": "2021-08-30T18:15:00", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:P/I:N/A:N"}, "cvss2": {"cvssV2": {"version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 4.0}, "severity": "MEDIUM", "exploitabilityScore": 8.0, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}, "cvss3": {"cvssV3": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.8, "impactScore": 1.4}, "href": "https://security-tracker.debian.org/tracker/CVE-2021-27019", "reporter": "Debian Security Bug Tracker", "references": [], "cvelist": ["CVE-2021-27019"], "immutableFields": [], "lastseen": "2023-02-22T06:08:12", "viewCount": 6, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2021-27019"]}, {"type": "ubuntucve", "idList": ["UB:CVE-2021-27019"]}, {"type": "veracode", "idList": ["VERACODE:38398"]}]}, "score": {"value": 2.0, "vector": "NONE"}, "backreferences": {"references": [{"type": "cve", "idList": ["CVE-2021-27019"]}, {"type": "ubuntucve", "idList": ["UB:CVE-2021-27019"]}]}, "exploitation": null, "epss": [{"cve": "CVE-2021-27019", "epss": "0.000530000", "percentile": "0.188190000", "modified": "2023-03-17"}], "vulnersScore": 2.0}, "_state": {"dependencies": 1677046138, "score": 1677046102, "epss": 1679163420}, "_internal": {"score_hash": "10be20658fc4eaa71edea97187903454"}, "affectedPackage": [{"OS": "Debian", "OSVersion": "12", "arch": "all", "packageFilename": "puppetdb_7.12.1-3_all.deb", "packageVersion": "7.12.1-3", "operator": "lt", "status": "resolved", "packageName": "puppetdb"}, {"OS": "Debian", "OSVersion": "10", "arch": "all", "packageFilename": "puppetdb_6.2.0-3_all.deb", "packageVersion": "6.2.0-3", "operator": "le", "status": "open", "packageName": "puppetdb"}, {"OS": "Debian", "OSVersion": "999", "arch": "all", "packageFilename": "puppetdb_7.12.1-3_all.deb", "packageVersion": "7.12.1-3", "operator": "lt", "status": "resolved", "packageName": "puppetdb"}]}
{"cve": [{"lastseen": "2023-02-09T14:14:46", "description": "PuppetDB logging included potentially sensitive system information.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "baseScore": 4.3, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 1.4}, "published": "2021-08-30T18:15:00", "type": "cve", "title": "CVE-2021-27019", "cwe": ["CWE-532"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.0, "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-27019"], "modified": "2021-09-07T14:18:00", "cpe": [], "id": "CVE-2021-27019", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-27019", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:P/I:N/A:N"}, "cpe23": []}], "ubuntucve": [{"lastseen": "2022-10-26T13:29:32", "description": "PuppetDB logging included potentially sensitive system information.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "baseScore": 4.3, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 1.4}, "published": "2021-08-30T00:00:00", "type": "ubuntucve", "title": "CVE-2021-27019", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.0, "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-27019"], "modified": "2021-08-30T00:00:00", "id": "UB:CVE-2021-27019", "href": "https://ubuntu.com/security/CVE-2021-27019", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:P/I:N/A:N"}}], "veracode": [{"lastseen": "2022-12-22T00:59:13", "description": "puppetdb is vulnerable to information disclosure. The vulnerability exists due to information exposure through log files which allows an attacker to gain access to sensitive information.\n", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "baseScore": 4.3, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 1.4}, "published": "2022-12-10T04:24:52", "type": "veracode", "title": "Information Disclosure", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.0, "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-27019"], "modified": "2022-12-21T07:24:04", "id": "VERACODE:38398", "href": "https://sca.analysiscenter.veracode.com/vulnerability-database/security/1/1/sid-38398/summary", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:P/I:N/A:N"}}]}