CVE-2017-10690
- EPSS 0.19%
- Veröffentlicht 09.02.2018 20:29:00
- Zuletzt bearbeitet 21.11.2024 03:06:18
In previous versions of Puppet Agent it was possible for the agent to retrieve facts from an environment that it was not classified to retrieve from. This was resolved in Puppet Agent 5.3.4, included in Puppet Enterprise 2017.3.4
CVE-2014-3250
- EPSS 0.26%
- Veröffentlicht 11.12.2017 17:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
The default vhost configuration file in Puppet before 3.6.2 does not include the SSLCARevocationCheck directive, which might allow remote attackers to obtain sensitive information via a revoked certificate when a Puppet master runs with Apache 2.4.
CVE-2017-2295
- EPSS 2.03%
- Veröffentlicht 05.07.2017 15:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
Versions of Puppet prior to 4.10.1 will deserialize data off the wire (from the agent to the server, in this case) with a attacker-specified format. This could be used to force YAML deserialization in an unsafe manner, which would lead to remote code...
CVE-2016-2785
- EPSS 0.17%
- Veröffentlicht 10.06.2016 15:59:00
- Zuletzt bearbeitet 12.04.2025 10:46:40
Puppet Server before 2.3.2 and Ruby puppetmaster in Puppet 4.x before 4.4.2 and in Puppet Agent before 1.4.2 might allow remote attackers to bypass intended auth.conf access restrictions by leveraging incorrect URL decoding.
CVE-2014-3248
- EPSS 0.16%
- Veröffentlicht 16.11.2014 17:59:03
- Zuletzt bearbeitet 12.04.2025 10:46:40
Untrusted search path vulnerability in Puppet Enterprise 2.8 before 2.8.7, Puppet before 2.7.26 and 3.x before 3.6.2, Facter 1.6.x and 2.x before 2.0.2, Hiera before 1.3.4, and Mcollective before 2.5.2, when running with Ruby 1.9.1 or earlier, allows...
CVE-2011-0528
- EPSS 0.27%
- Veröffentlicht 17.02.2014 16:55:04
- Zuletzt bearbeitet 11.04.2025 00:51:21
Puppet 2.6.0 through 2.6.3 does not properly restrict access to node resources, which allows remote authenticated Puppet nodes to read or modify the resources of other nodes via unspecified vectors.
CVE-2013-4956
- EPSS 0.11%
- Veröffentlicht 20.08.2013 22:55:04
- Zuletzt bearbeitet 11.04.2025 00:51:21
Puppet Module Tool (PMT), as used in Puppet 2.7.x before 2.7.23 and 3.2.x before 3.2.4, and Puppet Enterprise 2.8.x before 2.8.3 and 3.0.x before 3.0.1, installs modules with weak permissions if those permissions were used when the modules were origi...
CVE-2013-4761
- EPSS 0.62%
- Veröffentlicht 20.08.2013 22:55:04
- Zuletzt bearbeitet 11.04.2025 00:51:21
Unspecified vulnerability in Puppet 2.7.x before 2.7.23 and 3.2.x before 3.2.4, and Puppet Enterprise 2.8.x before 2.8.3 and 3.0.x before 3.0.1, allows remote attackers to execute arbitrary Ruby programs from the master via the resource_type service....
CVE-2013-3567
- EPSS 11.14%
- Veröffentlicht 19.08.2013 23:55:08
- Zuletzt bearbeitet 11.04.2025 00:51:21
Puppet 2.7.x before 2.7.22 and 3.2.x before 3.2.2, and Puppet Enterprise before 2.8.2, deserializes untrusted YAML, which allows remote attackers to instantiate arbitrary Ruby classes and execute arbitrary code via a crafted REST API call.
CVE-2013-1655
- EPSS 0.75%
- Veröffentlicht 20.03.2013 16:55:01
- Zuletzt bearbeitet 11.04.2025 00:51:21
Puppet 2.7.x before 2.7.21 and 3.1.x before 3.1.1, when running Ruby 1.9.3 or later, allows remote attackers to execute arbitrary code via vectors related to "serialized attributes."