Puppet

Continuous Delivery

4 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.32%
  • Published 18.11.2021 15:15:09
  • Last modified 21.11.2024 05:57:12

A flaw was discovered in Continuous Delivery for Puppet Enterprise (CD4PE) that results in a user with lower privileges being able to access a Puppet Enterprise API token. This issue is resolved in CD4PE 4.10.0

  • EPSS 0.05%
  • Published 18.09.2020 18:15:20
  • Last modified 21.11.2024 05:38:03

Local registry credentials were included directly in the CD4PE deployment definition, which could expose these credentials to users who should not have access to them. This is resolved in Continuous Delivery for Puppet Enterprise 4.0.1.

  • EPSS 0.41%
  • Published 26.03.2020 15:15:25
  • Last modified 21.11.2024 05:38:03

In Continuous Delivery for Puppet Enterprise (CD4PE) before 3.4.0, changes to resources or classes containing Sensitive parameters can result in the Sensitive parameters ending up in the impact analysis report.

  • EPSS 0.41%
  • Published 12.12.2019 00:15:11
  • Last modified 21.11.2024 04:19:46

When using the cd4pe::root_configuration task to configure a Continuous Delivery for PE installation, the root user’s username and password were exposed in the job’s Job Details pane in the PE console. These issues have been resolved in version 1.2.1...