Show filters
119 Total Results
Displaying 41-50 of 119
Sort by:
Attacker Value
Unknown

CVE-2017-2296

Disclosure Date: February 01, 2018 (last updated November 26, 2024)
In Puppet Enterprise 2017.1.x and 2017.2.1, using specially formatted strings with certain formatting characters as Classifier node group names or RBAC role display names causes errors, effectively causing a DOS to the service. This was resolved in Puppet Enterprise 2017.2.2.
0
Attacker Value
Unknown

CVE-2015-4100

Disclosure Date: December 21, 2017 (last updated November 26, 2024)
Puppet Enterprise 3.7.x and 3.8.0 might allow remote authenticated users to manage certificates for arbitrary nodes by leveraging a client certificate trusted by the master, aka a "Certificate Authority Reverse Proxy Vulnerability."
0
Attacker Value
Unknown

CVE-2015-7224

Disclosure Date: December 21, 2017 (last updated November 26, 2024)
puppetlabs-mysql 3.1.0 through 3.6.0 allow remote attackers to bypass authentication by leveraging creation of a database account without a password when a 'mysql_user' user parameter contains a host with a netmask.
0
Attacker Value
Unknown

CVE-2015-8470

Disclosure Date: December 11, 2017 (last updated November 26, 2024)
The console in Puppet Enterprise 3.7.x, 3.8.x, and 2015.2.x does not set the secure flag for the JSESSIONID cookie in an HTTPS session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an HTTP session.
0
Attacker Value
Unknown

CVE-2015-6502

Disclosure Date: December 11, 2017 (last updated November 26, 2024)
Cross-site scripting (XSS) vulnerability in the console in Puppet Enterprise before 2015.2.1 allows remote attackers to inject arbitrary web script or HTML via the string parameter, related to Login Redirect.
0
Attacker Value
Unknown

CVE-2014-3250

Disclosure Date: December 11, 2017 (last updated November 26, 2024)
The default vhost configuration file in Puppet before 3.6.2 does not include the SSLCARevocationCheck directive, which might allow remote attackers to obtain sensitive information via a revoked certificate when a Puppet master runs with Apache 2.4.
0
Attacker Value
Unknown

CVE-2016-5713

Disclosure Date: December 06, 2017 (last updated November 26, 2024)
Versions of Puppet Agent prior to 1.6.0 included a version of the Puppet Execution Protocol (PXP) agent that passed environment variables through to Puppet runs. This could allow unauthorized code to be loaded. This bug was first introduced in Puppet Agent 1.3.0.
0
Attacker Value
Unknown

CVE-2016-5714

Disclosure Date: October 18, 2017 (last updated November 26, 2024)
Puppet Enterprise 2015.3.3 and 2016.x before 2016.4.0, and Puppet Agent 1.3.6 through 1.7.0 allow remote attackers to bypass a host whitelist protection mechanism and execute arbitrary code on Puppet nodes via vectors related to command validation, aka "Puppet Execution Protocol (PXP) Command Whitelist Validation Vulnerability."
Attacker Value
Unknown

CVE-2017-2299

Disclosure Date: September 15, 2017 (last updated November 26, 2024)
Versions of the puppetlabs-apache module prior to 1.11.1 and 2.1.0 make it very easy to accidentally misconfigure TLS trust. If you specify the `ssl_ca` parameter but do not specify the `ssl_certs_dir` parameter, a default will be provided for the `ssl_certs_dir` that will trust certificates from any of the system-trusted certificate authorities. This did not affect FreeBSD.
0
Attacker Value
Unknown

CVE-2016-5716

Disclosure Date: August 09, 2017 (last updated November 26, 2024)
The console in Puppet Enterprise 2015.x and 2016.x prior to 2016.4.0 includes unsafe string reads that potentially allows for remote code execution on the console node.
0