Vulnerabilities > Puppet > High

DATE CVE VULNERABILITY TITLE RISK
2018-10-02 CVE-2018-11748 Insufficiently Protected Credentials vulnerability in Puppet Device Manager
Previous releases of the Puppet device_manager module creates configuration files containing credentials that are world readable.
local
low complexity
puppet CWE-522
7.8
2018-06-14 CVE-2018-6516 Unspecified vulnerability in Puppet Enterprise Client Tools 16.4.0/17.3.0/18.1.0
On Windows only, with a specifically crafted configuration file an attacker could get Puppet PE client tools (aka pe-client-tools) 16.4.x prior to 16.4.6, 17.3.x prior to 17.3.6, and 18.1.x prior to 18.1.2 to load arbitrary code with privilege escalation.
local
low complexity
puppet
7.8
2018-06-11 CVE-2018-6515 Improper Input Validation vulnerability in Puppet
Puppet Agent 1.10.x prior to 1.10.13, Puppet Agent 5.3.x prior to 5.3.7, and Puppet Agent 5.5.x prior to 5.5.2 on Windows only, with a specially crafted configuration file an attacker could get pxp-agent to load arbitrary code with privilege escalation.
local
low complexity
puppet CWE-20
7.8
2018-06-11 CVE-2018-6514 Untrusted Search Path vulnerability in Puppet
In Puppet Agent 1.10.x prior to 1.10.13, Puppet Agent 5.3.x prior to 5.3.7, Puppet Agent 5.5.x prior to 5.5.2, Facter on Windows is vulnerable to a DLL preloading attack, which could lead to a privilege escalation.
local
low complexity
puppet CWE-426
7.8
2018-06-11 CVE-2018-6513 Untrusted Search Path vulnerability in Puppet and Puppet Enterprise
Puppet Enterprise 2016.4.x prior to 2016.4.12, Puppet Enterprise 2017.3.x prior to 2017.3.7, Puppet Enterprise 2018.1.x prior to 2018.1.1, Puppet Agent 1.10.x prior to 1.10.13, Puppet Agent 5.3.x prior to 5.3.7, and Puppet Agent 5.5.x prior to 5.5.2, were vulnerable to an attack where an unprivileged user on Windows agents could write custom facts that can escalate privileges on the next puppet run.
network
low complexity
puppet CWE-426
8.8
2018-02-09 CVE-2018-6508 Use of Externally-Controlled Format String vulnerability in Puppet Enterprise 2017.3.0/2017.3.1/2017.3.2
Puppet Enterprise 2017.3.x prior to 2017.3.3 are vulnerable to a remote execution bug when a specially crafted string was passed into the facter_task or puppet_conf tasks.
network
low complexity
puppet CWE-134
8.0
2018-02-01 CVE-2017-2297 Improper Authentication vulnerability in Puppet Enterprise
Puppet Enterprise versions prior to 2016.4.5 and 2017.2.1 did not correctly authenticate users before returning labeled RBAC access tokens.
network
high complexity
puppet CWE-287
7.5
2017-10-18 CVE-2016-5714 Improper Access Control vulnerability in Puppet Agent and Puppet Enterprise
Puppet Enterprise 2015.3.3 and 2016.x before 2016.4.0, and Puppet Agent 1.3.6 through 1.7.0 allow remote attackers to bypass a host whitelist protection mechanism and execute arbitrary code on Puppet nodes via vectors related to command validation, aka "Puppet Execution Protocol (PXP) Command Whitelist Validation Vulnerability."
network
low complexity
puppet CWE-284
7.2
2017-09-15 CVE-2017-2299 Improper Certificate Validation vulnerability in Puppet Puppetlabs-Apache
Versions of the puppetlabs-apache module prior to 1.11.1 and 2.1.0 make it very easy to accidentally misconfigure TLS trust.
network
low complexity
puppet CWE-295
7.5
2017-08-09 CVE-2016-5716 Use of Externally-Controlled Format String vulnerability in Puppet Enterprise
The console in Puppet Enterprise 2015.x and 2016.x prior to 2016.4.0 includes unsafe string reads that potentially allows for remote code execution on the console node.
network
low complexity
puppet CWE-134
8.8