Puppetlabs

Puppet

30 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.75%
  • Published 20.03.2013 16:55:01
  • Last modified 11.04.2025 00:51:21

Puppet 2.7.x before 2.7.21 and 3.1.x before 3.1.1, when running Ruby 1.9.3 or later, allows remote attackers to execute arbitrary code via vectors related to "serialized attributes."

  • EPSS 0.51%
  • Published 20.03.2013 16:55:01
  • Last modified 11.04.2025 00:51:21

Puppet 2.7.x before 2.7.21 and 3.1.x before 3.1.1, and Puppet Enterprise 2.7.x before 2.7.2, does not properly negotiate the SSL protocol between client and master, which allows remote attackers to conduct SSLv2 downgrade attacks against SSLv3 sessio...

  • EPSS 1.55%
  • Published 20.03.2013 16:55:01
  • Last modified 11.04.2025 00:51:21

Puppet before 2.6.18, 2.7.x before 2.7.21, and 3.1.x before 3.1.1, and Puppet Enterprise before 1.2.7 and 2.7.x before 2.7.2, when listening for incoming connections is enabled and allowing access to the "run" REST endpoint is allowed, allows remote ...

  • EPSS 0.31%
  • Published 20.03.2013 16:55:01
  • Last modified 11.04.2025 00:51:21

Puppet before 2.6.18, 2.7.x before 2.7.21, and 3.1.x before 3.1.1, and Puppet Enterprise before 1.2.7 and 2.7.x before 2.7.2 allows remote authenticated users with a valid certificate and private key to read arbitrary catalogs or poison the master's ...

Exploit
  • EPSS 1.42%
  • Published 06.08.2012 16:55:06
  • Last modified 11.04.2025 00:51:21

lib/puppet/ssl/certificate_authority.rb in Puppet before 2.6.17 and 2.7.x before 2.7.18, and Puppet Enterprise before 2.5.2, does not properly restrict the characters in the Common Name field of a Certificate Signing Request (CSR), which makes it eas...

Exploit
  • EPSS 0.05%
  • Published 06.08.2012 16:55:06
  • Last modified 11.04.2025 00:51:21

lib/puppet/defaults.rb in Puppet 2.7.x before 2.7.18, and Puppet Enterprise before 2.5.2, uses 0644 permissions for last_run_report.yaml, which allows local users to obtain sensitive configuration information by leveraging access to the puppet master...

Exploit
  • EPSS 2.15%
  • Published 06.08.2012 16:55:06
  • Last modified 11.04.2025 00:51:21

Directory traversal vulnerability in lib/puppet/reports/store.rb in Puppet before 2.6.17 and 2.7.x before 2.7.18, and Puppet Enterprise before 2.5.2, when Delete is enabled in auth.conf, allows remote authenticated users to delete arbitrary files on ...

Exploit
  • EPSS 0.31%
  • Published 06.08.2012 16:55:06
  • Last modified 11.04.2025 00:51:21

Puppet before 2.6.17 and 2.7.x before 2.7.18, and Puppet Enterprise before 2.5.2, allows remote authenticated users to read arbitrary files on the puppet master server by leveraging an arbitrary user's certificate and private key in a GET request.

Exploit
  • EPSS 0.26%
  • Published 06.08.2012 16:55:05
  • Last modified 11.04.2025 00:51:21

lib/puppet/network/authstore.rb in Puppet before 2.7.18, and Puppet Enterprise before 2.5.2, supports use of IP addresses in certnames without warning of potential risks, which might allow remote attackers to spoof an agent by acquiring a previously ...

  • EPSS 0.09%
  • Published 27.06.2012 18:55:01
  • Last modified 11.04.2025 00:51:21

telnet.rb in Puppet 2.7.x before 2.7.13 and Puppet Enterprise (PE) 1.2.x, 2.0.x, and 2.5.x before 2.5.1 allows local users to overwrite arbitrary files via a symlink attack on the NET::Telnet connection log (/tmp/out.log).