Description
puppetdb is vulnerable to information disclosure. The vulnerability exists due to information exposure through log files which allows an attacker to gain access to sensitive information.
Affected Software
Related
{"id": "VERACODE:38398", "vendorId": null, "type": "veracode", "bulletinFamily": "software", "title": "Information Disclosure", "description": "puppetdb is vulnerable to information disclosure. The vulnerability exists due to information exposure through log files which allows an attacker to gain access to sensitive information.\n", "published": "2022-12-10T04:24:52", "modified": "2022-12-21T07:24:04", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:P/I:N/A:N"}, "cvss2": {"cvssV2": {"version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 4.0}, "severity": "MEDIUM", "exploitabilityScore": 8.0, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}, "cvss3": {"cvssV3": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.8, "impactScore": 1.4}, "href": "https://sca.analysiscenter.veracode.com/vulnerability-database/security/1/1/sid-38398/summary", "reporter": "Veracode Vulnerability Database", "references": ["https://security-tracker.debian.org/tracker/CVE-2021-27019", "https://github.com/advisories/GHSA-7jgx-q4jq-pp55", "https://puppet.com/security/cve/CVE-2021-27019"], "cvelist": ["CVE-2021-27019"], "immutableFields": [], "lastseen": "2022-12-22T00:59:13", "viewCount": 1, "enchantments": {"score": {"value": 2.1, "vector": "NONE"}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2021-27019"]}, {"type": "debiancve", "idList": ["DEBIANCVE:CVE-2021-27019"]}, {"type": "ubuntucve", "idList": ["UB:CVE-2021-27019"]}]}, "affected_software": {"major_version": [{"name": "puppetdb:sid", "version": 6}, {"name": "puppetdb:sid", "version": 6}, {"name": "puppetdb:sid", "version": 6}, {"name": "puppetdb:sid", "version": 6}]}, "epss": [{"cve": "CVE-2021-27019", "epss": "0.000530000", "percentile": "0.187820000", "modified": "2023-03-20"}], "vulnersScore": 2.1}, "_state": {"score": 1671671162, "dependencies": 1671670922, "affected_software_major_version": 1671672775, "epss": 1679354432}, "_internal": {"score_hash": "781f2988a1ae195b7954fdb3f7608020"}, "affectedSoftware": [{"version": "6.2.0-5", "operator": "eq", "name": "puppetdb:sid"}, {"version": "6.2.0-4", "operator": "eq", "name": "puppetdb:sid"}, {"version": "6.2.0-5", "operator": "eq", "name": "puppetdb:sid"}, {"version": "6.2.0-4", "operator": "eq", "name": "puppetdb:sid"}]}
{"cve": [{"lastseen": "2023-02-09T14:14:46", "description": "PuppetDB logging included potentially sensitive system information.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "baseScore": 4.3, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 1.4}, "published": "2021-08-30T18:15:00", "type": "cve", "title": "CVE-2021-27019", "cwe": ["CWE-532"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.0, "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-27019"], "modified": "2021-09-07T14:18:00", "cpe": [], "id": "CVE-2021-27019", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-27019", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:P/I:N/A:N"}, "cpe23": []}], "ubuntucve": [{"lastseen": "2022-10-26T13:29:32", "description": "PuppetDB logging included potentially sensitive system information.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "baseScore": 4.3, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 1.4}, "published": "2021-08-30T00:00:00", "type": "ubuntucve", "title": "CVE-2021-27019", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.0, "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-27019"], "modified": "2021-08-30T00:00:00", "id": "UB:CVE-2021-27019", "href": "https://ubuntu.com/security/CVE-2021-27019", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:P/I:N/A:N"}}], "debiancve": [{"lastseen": "2023-02-22T06:08:12", "description": "PuppetDB logging included potentially sensitive system information.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "baseScore": 4.3, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 1.4}, "published": "2021-08-30T18:15:00", "type": "debiancve", "title": "CVE-2021-27019", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.0, "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-27019"], "modified": "2021-08-30T18:15:00", "id": "DEBIANCVE:CVE-2021-27019", "href": "https://security-tracker.debian.org/tracker/CVE-2021-27019", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:P/I:N/A:N"}}]}