Puppet

Puppet

42 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.26%
  • Veröffentlicht 11.12.2017 17:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The default vhost configuration file in Puppet before 3.6.2 does not include the SSLCARevocationCheck directive, which might allow remote attackers to obtain sensitive information via a revoked certificate when a Puppet master runs with Apache 2.4.

  • EPSS 1.45%
  • Veröffentlicht 05.07.2017 15:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

Versions of Puppet prior to 4.10.1 will deserialize data off the wire (from the agent to the server, in this case) with a attacker-specified format. This could be used to force YAML deserialization in an unsafe manner, which would lead to remote code...

  • EPSS 0.17%
  • Veröffentlicht 10.06.2016 15:59:00
  • Zuletzt bearbeitet 06.05.2026 22:30:45

Puppet Server before 2.3.2 and Ruby puppetmaster in Puppet 4.x before 4.4.2 and in Puppet Agent before 1.4.2 might allow remote attackers to bypass intended auth.conf access restrictions by leveraging incorrect URL decoding.

Exploit
  • EPSS 0.07%
  • Veröffentlicht 16.11.2014 17:59:03
  • Zuletzt bearbeitet 06.05.2026 22:30:45

Untrusted search path vulnerability in Puppet Enterprise 2.8 before 2.8.7, Puppet before 2.7.26 and 3.x before 3.6.2, Facter 1.6.x and 2.x before 2.0.2, Hiera before 1.3.4, and Mcollective before 2.5.2, when running with Ruby 1.9.1 or earlier, allows...

  • EPSS 0.27%
  • Veröffentlicht 17.02.2014 16:55:04
  • Zuletzt bearbeitet 29.04.2026 01:13:23

Puppet 2.6.0 through 2.6.3 does not properly restrict access to node resources, which allows remote authenticated Puppet nodes to read or modify the resources of other nodes via unspecified vectors.

  • EPSS 0.11%
  • Veröffentlicht 20.08.2013 22:55:04
  • Zuletzt bearbeitet 29.04.2026 01:13:23

Puppet Module Tool (PMT), as used in Puppet 2.7.x before 2.7.23 and 3.2.x before 3.2.4, and Puppet Enterprise 2.8.x before 2.8.3 and 3.0.x before 3.0.1, installs modules with weak permissions if those permissions were used when the modules were origi...

  • EPSS 0.62%
  • Veröffentlicht 20.08.2013 22:55:04
  • Zuletzt bearbeitet 29.04.2026 01:13:23

Unspecified vulnerability in Puppet 2.7.x before 2.7.23 and 3.2.x before 3.2.4, and Puppet Enterprise 2.8.x before 2.8.3 and 3.0.x before 3.0.1, allows remote attackers to execute arbitrary Ruby programs from the master via the resource_type service....

  • EPSS 5.77%
  • Veröffentlicht 19.08.2013 23:55:08
  • Zuletzt bearbeitet 29.04.2026 01:13:23

Puppet 2.7.x before 2.7.22 and 3.2.x before 3.2.2, and Puppet Enterprise before 2.8.2, deserializes untrusted YAML, which allows remote attackers to instantiate arbitrary Ruby classes and execute arbitrary code via a crafted REST API call.

  • EPSS 0.63%
  • Veröffentlicht 20.03.2013 16:55:01
  • Zuletzt bearbeitet 29.04.2026 01:13:23

Puppet 2.7.x before 2.7.21 and 3.1.x before 3.1.1, when running Ruby 1.9.3 or later, allows remote attackers to execute arbitrary code via vectors related to "serialized attributes."

  • EPSS 0.38%
  • Veröffentlicht 20.03.2013 16:55:01
  • Zuletzt bearbeitet 29.04.2026 01:13:23

The default configuration for puppet masters 0.25.0 and later in Puppet before 2.6.18, 2.7.x before 2.7.21, and 3.1.x before 3.1.1, and Puppet Enterprise before 1.2.7 and 2.7.x before 2.7.2, allows remote authenticated nodes to submit reports for oth...