Puppet

Puppet

43 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.19%
  • Published 09.02.2018 20:29:00
  • Last modified 21.11.2024 03:06:18

In previous versions of Puppet Agent it was possible for the agent to retrieve facts from an environment that it was not classified to retrieve from. This was resolved in Puppet Agent 5.3.4, included in Puppet Enterprise 2017.3.4

  • EPSS 0.26%
  • Published 11.12.2017 17:29:00
  • Last modified 20.04.2025 01:37:25

The default vhost configuration file in Puppet before 3.6.2 does not include the SSLCARevocationCheck directive, which might allow remote attackers to obtain sensitive information via a revoked certificate when a Puppet master runs with Apache 2.4.

  • EPSS 2.03%
  • Published 05.07.2017 15:29:00
  • Last modified 20.04.2025 01:37:25

Versions of Puppet prior to 4.10.1 will deserialize data off the wire (from the agent to the server, in this case) with a attacker-specified format. This could be used to force YAML deserialization in an unsafe manner, which would lead to remote code...

  • EPSS 0.17%
  • Published 10.06.2016 15:59:00
  • Last modified 12.04.2025 10:46:40

Puppet Server before 2.3.2 and Ruby puppetmaster in Puppet 4.x before 4.4.2 and in Puppet Agent before 1.4.2 might allow remote attackers to bypass intended auth.conf access restrictions by leveraging incorrect URL decoding.

Exploit
  • EPSS 0.16%
  • Published 16.11.2014 17:59:03
  • Last modified 12.04.2025 10:46:40

Untrusted search path vulnerability in Puppet Enterprise 2.8 before 2.8.7, Puppet before 2.7.26 and 3.x before 3.6.2, Facter 1.6.x and 2.x before 2.0.2, Hiera before 1.3.4, and Mcollective before 2.5.2, when running with Ruby 1.9.1 or earlier, allows...

  • EPSS 0.27%
  • Published 17.02.2014 16:55:04
  • Last modified 11.04.2025 00:51:21

Puppet 2.6.0 through 2.6.3 does not properly restrict access to node resources, which allows remote authenticated Puppet nodes to read or modify the resources of other nodes via unspecified vectors.

  • EPSS 0.11%
  • Published 20.08.2013 22:55:04
  • Last modified 11.04.2025 00:51:21

Puppet Module Tool (PMT), as used in Puppet 2.7.x before 2.7.23 and 3.2.x before 3.2.4, and Puppet Enterprise 2.8.x before 2.8.3 and 3.0.x before 3.0.1, installs modules with weak permissions if those permissions were used when the modules were origi...

  • EPSS 0.62%
  • Published 20.08.2013 22:55:04
  • Last modified 11.04.2025 00:51:21

Unspecified vulnerability in Puppet 2.7.x before 2.7.23 and 3.2.x before 3.2.4, and Puppet Enterprise 2.8.x before 2.8.3 and 3.0.x before 3.0.1, allows remote attackers to execute arbitrary Ruby programs from the master via the resource_type service....

  • EPSS 11.14%
  • Published 19.08.2013 23:55:08
  • Last modified 11.04.2025 00:51:21

Puppet 2.7.x before 2.7.22 and 3.2.x before 3.2.2, and Puppet Enterprise before 2.8.2, deserializes untrusted YAML, which allows remote attackers to instantiate arbitrary Ruby classes and execute arbitrary code via a crafted REST API call.

  • EPSS 0.75%
  • Published 20.03.2013 16:55:01
  • Last modified 11.04.2025 00:51:21

Puppet 2.7.x before 2.7.21 and 3.1.x before 3.1.1, when running Ruby 1.9.3 or later, allows remote attackers to execute arbitrary code via vectors related to "serialized attributes."