Lucene search

K
PuppetPuppet Enterprise

8 matches found

CVE
CVE
added 2017/07/13 1:29 p.m.1825 views

CVE-2017-7529

Nginx versions since 0.5.6 up to and including 1.13.2 are vulnerable to integer overflow vulnerability in nginx range filter module resulting into leak of potentially sensitive information triggered by specially crafted request.

7.5CVSS7.3AI score0.91909EPSS
CVE
CVE
added 2013/08/19 11:55 p.m.117 views

CVE-2013-3567

Puppet 2.7.x before 2.7.22 and 3.2.x before 3.2.2, and Puppet Enterprise before 2.8.2, deserializes untrusted YAML, which allows remote attackers to instantiate arbitrary Ruby classes and execute arbitrary code via a crafted REST API call.

7.5CVSS7.3AI score0.11139EPSS
CVE
CVE
added 2020/03/11 11:15 p.m.111 views

CVE-2020-7943

Puppet Server and PuppetDB provide useful performance and debugging information via their metrics API endpoints. For PuppetDB this may contain things like hostnames. Puppet Server reports resource names and titles for defined types (which may contain sensitive information) as well as function names...

7.5CVSS7.2AI score0.65366EPSS
CVE
CVE
added 2013/03/20 4:55 p.m.96 views

CVE-2013-1655

Puppet 2.7.x before 2.7.21 and 3.1.x before 3.1.1, when running Ruby 1.9.3 or later, allows remote attackers to execute arbitrary code via vectors related to "serialized attributes."

7.5CVSS8.1AI score0.00807EPSS
CVE
CVE
added 2013/03/20 4:55 p.m.66 views

CVE-2013-1653

Puppet before 2.6.18, 2.7.x before 2.7.21, and 3.1.x before 3.1.1, and Puppet Enterprise before 1.2.7 and 2.7.x before 2.7.2, when listening for incoming connections is enabled and allowing access to the "run" REST endpoint is allowed, allows remote authenticated users to execute arbitrary code via...

7.1CVSS7.2AI score0.01548EPSS
CVE
CVE
added 2018/02/01 10:29 p.m.50 views

CVE-2017-2297

Puppet Enterprise versions prior to 2016.4.5 and 2017.2.1 did not correctly authenticate users before returning labeled RBAC access tokens. This issue has been fixed in Puppet Enterprise 2016.4.5 and 2017.2.1. This only affects users with labeled tokens, which is not the default for tokens.

7.5CVSS7.6AI score0.00319EPSS
CVE
CVE
added 2017/10/18 6:29 p.m.48 views

CVE-2016-5714

Puppet Enterprise 2015.3.3 and 2016.x before 2016.4.0, and Puppet Agent 1.3.6 through 1.7.0 allow remote attackers to bypass a host whitelist protection mechanism and execute arbitrary code on Puppet nodes via vectors related to command validation, aka "Puppet Execution Protocol (PXP) Command White...

7.2CVSS7.5AI score0.0101EPSS
CVE
CVE
added 2017/07/05 3:29 p.m.44 views

CVE-2017-2294

Versions of Puppet Enterprise prior to 2016.4.5 or 2017.2.1 failed to mark MCollective server private keys as sensitive (a feature added in Puppet 4.6), so key values could be logged and stored in PuppetDB. These releases use the sensitive data type to ensure this won't happen anymore.

7.5CVSS7.5AI score0.00306EPSS