Puppet

Puppet Agent

9 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.17%
  • Veröffentlicht 07.02.2025 20:15:31
  • Zuletzt bearbeitet 07.02.2025 20:15:31

Utilization of a module presented a security risk by allowing the deserialization of untrusted/user supplied data. This is resolved in the Puppet Agent 7.4.0 release.

  • EPSS 0.27%
  • Veröffentlicht 18.11.2021 15:15:09
  • Zuletzt bearbeitet 21.11.2024 05:57:11

A flaw was discovered in Puppet Agent and Puppet Server that may result in a leak of HTTP credentials when following HTTP redirects to a different host. This is similar to CVE-2018-1000007

  • EPSS 0.17%
  • Veröffentlicht 18.11.2021 15:15:09
  • Zuletzt bearbeitet 21.11.2024 05:57:12

A flaw was discovered in Puppet Agent where the agent may silently ignore Augeas settings or may be vulnerable to a Denial of Service condition prior to the first 'pluginsync'.

  • EPSS 0.12%
  • Veröffentlicht 19.02.2020 21:15:11
  • Zuletzt bearbeitet 21.11.2024 05:38:03

Previously, Puppet operated on a model that a node with a valid certificate was entitled to all information in the system and that a compromised certificate allowed access to everything in the infrastructure. When a node's catalog falls back to the `...

  • EPSS 2.72%
  • Veröffentlicht 29.11.2019 21:15:10
  • Zuletzt bearbeitet 21.11.2024 02:26:16

verify_certificate_identity in the OpenSSL extension in Ruby before 2.0.0 patchlevel 645, 2.1.x before 2.1.6, and 2.2.x before 2.2.2 does not properly validate hostnames, which allows remote attackers to spoof servers via vectors related to (1) multi...

  • EPSS 1.12%
  • Veröffentlicht 06.12.2017 15:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Versions of Puppet Agent prior to 1.6.0 included a version of the Puppet Execution Protocol (PXP) agent that passed environment variables through to Puppet runs. This could allow unauthorized code to be loaded. This bug was first introduced in Puppet...

  • EPSS 1.01%
  • Veröffentlicht 18.10.2017 18:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Puppet Enterprise 2015.3.3 and 2016.x before 2016.4.0, and Puppet Agent 1.3.6 through 1.7.0 allow remote attackers to bypass a host whitelist protection mechanism and execute arbitrary code on Puppet nodes via vectors related to command validation, a...

  • EPSS 0.71%
  • Veröffentlicht 10.06.2016 15:59:01
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The pxp-agent component in Puppet Enterprise 2015.3.x before 2015.3.3 and Puppet Agent 1.3.x before 1.3.6 does not properly validate server certificates, which might allow remote attackers to spoof brokers and execute arbitrary commands via a crafted...

  • EPSS 0.17%
  • Veröffentlicht 10.06.2016 15:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Puppet Server before 2.3.2 and Ruby puppetmaster in Puppet 4.x before 4.4.2 and in Puppet Agent before 1.4.2 might allow remote attackers to bypass intended auth.conf access restrictions by leveraging incorrect URL decoding.