Puppet

Puppet Enterprise

87 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 65.37%
  • Veröffentlicht 11.03.2020 23:15:11
  • Zuletzt bearbeitet 21.11.2024 05:38:03

Puppet Server and PuppetDB provide useful performance and debugging information via their metrics API endpoints. For PuppetDB this may contain things like hostnames. Puppet Server reports resource names and titles for defined types (which may contain...

  • EPSS 0.14%
  • Veröffentlicht 27.02.2020 01:15:10
  • Zuletzt bearbeitet 21.11.2024 02:33:38

Parts of the Puppet Enterprise Console 3.x were found to be susceptible to clickjacking and CSRF (Cross-Site Request Forgery) attacks. This would allow an attacker to redirect user input to an untrusted site or hijack a user session.

  • EPSS 0.42%
  • Veröffentlicht 12.12.2019 00:15:11
  • Zuletzt bearbeitet 21.11.2024 04:19:45

The express install, which is the suggested way to install Puppet Enterprise, gives the user a URL at the end of the install to set the admin password. If they do not use that URL, there is an overlooked default password for the admin user. This was ...

  • EPSS 0.33%
  • Veröffentlicht 11.12.2019 18:16:18
  • Zuletzt bearbeitet 21.11.2024 01:56:48

Puppet Enterprise before 3.0.1 allows remote attackers to (1) conduct clickjacking attacks via unspecified vectors related to the console, and (2) conduct cross-site scripting (XSS) attacks via unspecified vectors related to "live management."

  • EPSS 2.72%
  • Veröffentlicht 29.11.2019 21:15:10
  • Zuletzt bearbeitet 21.11.2024 02:26:16

verify_certificate_identity in the OpenSSL extension in Ruby before 2.0.0 patchlevel 645, 2.1.x before 2.1.6, and 2.2.x before 2.2.2 does not properly validate hostnames, which allows remote attackers to spoof servers via vectors related to (1) multi...

  • EPSS 0.15%
  • Veröffentlicht 24.08.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 03:43:57

When users are configured to use startTLS with RBAC LDAP, at login time, the user's credentials are sent via plaintext to the LDAP server. This affects Puppet Enterprise 2018.1.3, 2017.3.9, and 2016.4.14, and is fixed in Puppet Enterprise 2018.1.4, 2...

  • EPSS 0.37%
  • Veröffentlicht 11.06.2018 20:29:00
  • Zuletzt bearbeitet 21.11.2024 04:10:48

Puppet Enterprise 2016.4.x prior to 2016.4.12, Puppet Enterprise 2017.3.x prior to 2017.3.7, Puppet Enterprise 2018.1.x prior to 2018.1.1, Puppet Agent 1.10.x prior to 1.10.13, Puppet Agent 5.3.x prior to 5.3.7, and Puppet Agent 5.5.x prior to 5.5.2,...

  • EPSS 1.18%
  • Veröffentlicht 11.06.2018 20:29:00
  • Zuletzt bearbeitet 21.11.2024 04:10:48

The previous version of Puppet Enterprise 2018.1 is vulnerable to unsafe code execution when upgrading pe-razor-server. Affected releases are Puppet Enterprise: 2018.1.x versions prior to 2018.1.1 and razor-server and pe-razor-server prior to 1.9.0.0...

  • EPSS 0.25%
  • Veröffentlicht 08.05.2018 18:29:00
  • Zuletzt bearbeitet 21.11.2024 04:10:48

A cross-site scripting vulnerability in Puppet Enterprise Console of Puppet Enterprise allows a user to inject scripts into the Puppet Enterprise Console when using the Puppet Enterprise Console. Affected releases are Puppet Puppet Enterprise: 2017.3...

  • EPSS 0.25%
  • Veröffentlicht 08.05.2018 18:29:00
  • Zuletzt bearbeitet 21.11.2024 04:10:48

A cross-site scripting vulnerability in Puppet Enterprise Console of Puppet Enterprise allows a user to inject scripts into the Puppet Enterprise Console when using the Orchestrator. Affected releases are Puppet Puppet Enterprise: 2017.3.x versions p...