Vulnerabilities > Puppet
|2021-07-20||CVE-2021-27021|| SQL Injection vulnerability in Puppet |
A flaw was discovered in Puppet DB, this flaw results in an escalation of privileges which allows the user to delete tables via an SQL query.
| 6.5 |
|2020-09-18||CVE-2020-7945|| Insufficiently Protected Credentials vulnerability in Puppet Continuous Delivery 4.0.0 |
Local registry credentials were included directly in the CD4PE deployment definition, which could expose these credentials to users who should not have access to them.
| 2.1 |
|2020-03-26||CVE-2020-7944|| Information Exposure vulnerability in Puppet Continuous Delivery |
In Continuous Delivery for Puppet Enterprise (CD4PE) before 3.4.0, changes to resources or classes containing Sensitive parameters can result in the Sensitive parameters ending up in the impact analysis report.
| 4.0 |
|2020-03-11||CVE-2020-7943|| Information Exposure vulnerability in Puppet and Puppet Server |
Puppet Server and PuppetDB provide useful performance and debugging information via their metrics API endpoints.
| 5.0 |
|2020-02-27||CVE-2015-5686|| Cross-Site Request Forgery (CSRF) vulnerability in Puppet Enterprise |
Parts of the Puppet Enterprise Console 3.x were found to be susceptible to clickjacking and CSRF (Cross-Site Request Forgery) attacks.
| 6.8 |
|2020-02-19||CVE-2020-7942|| Improper Certificate Validation vulnerability in Puppet and Puppet Agent |
Previously, Puppet operated on a model that a node with a valid certificate was entitled to all information in the system and that a compromised certificate allowed access to everything in the infrastructure.
| 4.0 |
|2019-12-16||CVE-2018-11751|| Improper Certificate Validation vulnerability in Puppet Server |
Previous versions of Puppet Agent didn't verify the peer in the SSL connection prior to downloading the CRL.
| 4.8 |
|2019-12-13||CVE-2014-0175|| USE of Hard-Coded Credentials vulnerability in multiple products |
mcollective has a default password set at install
| 7.5 |
|2019-12-12||CVE-2019-10695|| Information Exposure Through LOG Files vulnerability in Puppet Continuous Delivery |
When using the cd4pe::root_configuration task to configure a Continuous Delivery for PE installation, the root user’s username and password were exposed in the job’s Job Details pane in the PE console.
| 4.0 |
|2019-12-12||CVE-2019-10694|| USE of Hard-Coded Credentials vulnerability in Puppet |
The express install, which is the suggested way to install Puppet Enterprise, gives the user a URL at the end of the install to set the admin password.
| 7.5 |