Puppet

Continuous Delivery

4 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.32%
  • Veröffentlicht 18.11.2021 15:15:09
  • Zuletzt bearbeitet 21.11.2024 05:57:12

A flaw was discovered in Continuous Delivery for Puppet Enterprise (CD4PE) that results in a user with lower privileges being able to access a Puppet Enterprise API token. This issue is resolved in CD4PE 4.10.0

  • EPSS 0.05%
  • Veröffentlicht 18.09.2020 18:15:20
  • Zuletzt bearbeitet 21.11.2024 05:38:03

Local registry credentials were included directly in the CD4PE deployment definition, which could expose these credentials to users who should not have access to them. This is resolved in Continuous Delivery for Puppet Enterprise 4.0.1.

  • EPSS 0.41%
  • Veröffentlicht 26.03.2020 15:15:25
  • Zuletzt bearbeitet 21.11.2024 05:38:03

In Continuous Delivery for Puppet Enterprise (CD4PE) before 3.4.0, changes to resources or classes containing Sensitive parameters can result in the Sensitive parameters ending up in the impact analysis report.

  • EPSS 0.41%
  • Veröffentlicht 12.12.2019 00:15:11
  • Zuletzt bearbeitet 21.11.2024 04:19:46

When using the cd4pe::root_configuration task to configure a Continuous Delivery for PE installation, the root user’s username and password were exposed in the job’s Job Details pane in the PE console. These issues have been resolved in version 1.2.1...