Page 2 of 63 results (0.015 seconds)

CVSS: 4.3EPSS: 0%CPEs: 3EXPL: 0

PuppetDB logging included potentially sensitive system information. El registro de PuppetDB incluía información potencialmente confidencial del sistema. • https://puppet.com/security/cve/CVE-2021-27019 • CWE-532: Insertion of Sensitive Information into Log File •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

Puppet Enterprise presented a security risk by not sanitizing user input when doing a CSV export. Puppet Enterprise presentaba un riesgo de seguridad al no sanear la entrada del usuario cuando se realizaba una exportación CSV. • https://puppet.com/security/cve/CVE-2021-27020 • CWE-1236: Improper Neutralization of Formula Elements in a CSV File •

CVSS: 8.8EPSS: 0%CPEs: 6EXPL: 0

A flaw was discovered in Puppet DB, this flaw results in an escalation of privileges which allows the user to delete tables via an SQL query. Se ha detectado un fallo en Puppet DB, este fallo resulta en una escalada de privilegios que permite al usuario eliminar tablas por medio de una consulta SQL • https://puppet.com/security/cve/cve-2021-27021 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') CWE-1027: OWASP Top Ten 2017 Category A1 - Injection •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

Puppet Enterprise before 3.0.1 allows remote attackers to (1) conduct clickjacking attacks via unspecified vectors related to the console, and (2) conduct cross-site scripting (XSS) attacks via unspecified vectors related to "live management." Puppet Enterprise versiones anteriores a 3.0.1, permite a atacantes remotos (1) conducir ataques de secuestro de cliqueo por medio de vectores no especificados relacionados con la consola, y (2) realizar ataques de tipo cross-site scripting (XSS) por medio de vectores no especificados relacionados con "live management". • http://puppetlabs.com/security/cve/cve-2013-4968 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.8EPSS: 0%CPEs: 3EXPL: 0

When users are configured to use startTLS with RBAC LDAP, at login time, the user's credentials are sent via plaintext to the LDAP server. This affects Puppet Enterprise 2018.1.3, 2017.3.9, and 2016.4.14, and is fixed in Puppet Enterprise 2018.1.4, 2017.3.10, and 2016.4.15. It scored an 8.5 CVSS score. Cuando se configuran usuarios para emplear startTLS con RBAC LDAP, al iniciar sesión, se envían las credenciales de usuario mediante texto plano al servidor LDAP. Esto afecta a Puppet Enterprise 2018.1.3, 2017.3.9 y 2016.4.14, y se ha solucionado en Puppet Enterprise 2018.1.4, 2017.3.10 y 2016.4.15. • https://puppet.com/security/cve/cve-2018-11749 • CWE-319: Cleartext Transmission of Sensitive Information •