Puppetlabs

Puppet

30 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.75%
  • Veröffentlicht 20.03.2013 16:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Puppet 2.7.x before 2.7.21 and 3.1.x before 3.1.1, when running Ruby 1.9.3 or later, allows remote attackers to execute arbitrary code via vectors related to "serialized attributes."

  • EPSS 0.51%
  • Veröffentlicht 20.03.2013 16:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Puppet 2.7.x before 2.7.21 and 3.1.x before 3.1.1, and Puppet Enterprise 2.7.x before 2.7.2, does not properly negotiate the SSL protocol between client and master, which allows remote attackers to conduct SSLv2 downgrade attacks against SSLv3 sessio...

  • EPSS 1.55%
  • Veröffentlicht 20.03.2013 16:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Puppet before 2.6.18, 2.7.x before 2.7.21, and 3.1.x before 3.1.1, and Puppet Enterprise before 1.2.7 and 2.7.x before 2.7.2, when listening for incoming connections is enabled and allowing access to the "run" REST endpoint is allowed, allows remote ...

  • EPSS 0.31%
  • Veröffentlicht 20.03.2013 16:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Puppet before 2.6.18, 2.7.x before 2.7.21, and 3.1.x before 3.1.1, and Puppet Enterprise before 1.2.7 and 2.7.x before 2.7.2 allows remote authenticated users with a valid certificate and private key to read arbitrary catalogs or poison the master's ...

Exploit
  • EPSS 1.42%
  • Veröffentlicht 06.08.2012 16:55:06
  • Zuletzt bearbeitet 11.04.2025 00:51:21

lib/puppet/ssl/certificate_authority.rb in Puppet before 2.6.17 and 2.7.x before 2.7.18, and Puppet Enterprise before 2.5.2, does not properly restrict the characters in the Common Name field of a Certificate Signing Request (CSR), which makes it eas...

Exploit
  • EPSS 0.05%
  • Veröffentlicht 06.08.2012 16:55:06
  • Zuletzt bearbeitet 11.04.2025 00:51:21

lib/puppet/defaults.rb in Puppet 2.7.x before 2.7.18, and Puppet Enterprise before 2.5.2, uses 0644 permissions for last_run_report.yaml, which allows local users to obtain sensitive configuration information by leveraging access to the puppet master...

Exploit
  • EPSS 2.15%
  • Veröffentlicht 06.08.2012 16:55:06
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Directory traversal vulnerability in lib/puppet/reports/store.rb in Puppet before 2.6.17 and 2.7.x before 2.7.18, and Puppet Enterprise before 2.5.2, when Delete is enabled in auth.conf, allows remote authenticated users to delete arbitrary files on ...

Exploit
  • EPSS 0.31%
  • Veröffentlicht 06.08.2012 16:55:06
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Puppet before 2.6.17 and 2.7.x before 2.7.18, and Puppet Enterprise before 2.5.2, allows remote authenticated users to read arbitrary files on the puppet master server by leveraging an arbitrary user's certificate and private key in a GET request.

Exploit
  • EPSS 0.26%
  • Veröffentlicht 06.08.2012 16:55:05
  • Zuletzt bearbeitet 11.04.2025 00:51:21

lib/puppet/network/authstore.rb in Puppet before 2.7.18, and Puppet Enterprise before 2.5.2, supports use of IP addresses in certnames without warning of potential risks, which might allow remote attackers to spoof an agent by acquiring a previously ...

  • EPSS 0.09%
  • Veröffentlicht 27.06.2012 18:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

telnet.rb in Puppet 2.7.x before 2.7.13 and Puppet Enterprise (PE) 1.2.x, 2.0.x, and 2.5.x before 2.5.1 allows local users to overwrite arbitrary files via a symlink attack on the NET::Telnet connection log (/tmp/out.log).