Page 4 of 129 results (0.017 seconds)

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

02 Oct 2018 — Previous releases of the Puppet device_manager module creates configuration files containing credentials that are world readable. This issue has been resolved as of device_manager 2.7.0. Las versiones anteriores del módulo device_manager para Puppet crean archivos de configuración que contienen credenciales legibles por todo el mundo. Este problema se ha resuelto en la versión 2.7.0 de device_manager. • https://puppet.com/security/cve/CVE-2018-11748 • CWE-522: Insufficiently Protected Credentials •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

02 Oct 2018 — Previous releases of the Puppet cisco_ios module did not validate a host's identity before starting a SSH connection. As of the 0.4.0 release of cisco_ios, host key checking is enabled by default. Las versiones anteriores del módulo cisco_ios para Puppet no validaron la identidad de un host antes de comenzar una conexión SSH. En la versión 0.4.0 de cisco_ios, la comprobación de claves de host está habilitada por defecto. • https://exchange.xforce.ibmcloud.com/vulnerabilities/150978 • CWE-20: Improper Input Validation •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

02 Oct 2018 — Previous releases of the Puppet cisco_ios module output SSH session debug information including login credentials to a world readable file on every run. These issues have been resolved in the 0.4.0 release. Las versiones anteriores del módulo cisco_ios para Puppet envían información de depuración de sesión SSH incluyendo las credenciales de inicio de sesión a un archivo legible por todo el mundo en cada ejecución. Este problema se ha resuelto en la versión 0.4.0. • https://puppet.com/security/cve/CVE-2018-11752 • CWE-522: Insufficiently Protected Credentials •

CVSS: 9.8EPSS: 0%CPEs: 3EXPL: 0

24 Aug 2018 — When users are configured to use startTLS with RBAC LDAP, at login time, the user's credentials are sent via plaintext to the LDAP server. This affects Puppet Enterprise 2018.1.3, 2017.3.9, and 2016.4.14, and is fixed in Puppet Enterprise 2018.1.4, 2017.3.10, and 2016.4.15. It scored an 8.5 CVSS score. Cuando se configuran usuarios para emplear startTLS con RBAC LDAP, al iniciar sesión, se envían las credenciales de usuario mediante texto plano al servidor LDAP. Esto afecta a Puppet Enterprise 2018.1.3, 201... • https://puppet.com/security/cve/cve-2018-11749 • CWE-319: Cleartext Transmission of Sensitive Information •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

03 Jul 2018 — In Puppet Discovery prior to 1.2.0, when running Discovery against Windows hosts, WinRM connections can fall back to using basic auth over insecure channels if a HTTPS server is not available. This can expose the login credentials being used by Puppet Discovery. En Puppet Discovery en versiones anteriores a la 1.2.0, cuando se ejecuta Discovery contra hosts Windows, las conexiones WinRM pueden desconectarse usando un auth básico en canales no seguros si un servidor HTTPS no está disponible. Esto puede expon... • https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26%40%3Ccommits.pulsar.apache.org%3E • CWE-522: Insufficiently Protected Credentials •

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 0

14 Jun 2018 — On Windows only, with a specifically crafted configuration file an attacker could get Puppet PE client tools (aka pe-client-tools) 16.4.x prior to 16.4.6, 17.3.x prior to 17.3.6, and 18.1.x prior to 18.1.2 to load arbitrary code with privilege escalation. Solo en Windows, con un archivo de configuración específicamente manipulado, un atacante podría hacer que las herramientas del cliente Puppet PE (también conocidas como pe-client-tools) en versiones 16.4.x anteriores a la 16.4.6, versiones 17.3.x anteriore... • https://puppet.com/security/cve/CVE-2018-6516 •

CVSS: 9.8EPSS: 1%CPEs: 3EXPL: 0

11 Jun 2018 — The previous version of Puppet Enterprise 2018.1 is vulnerable to unsafe code execution when upgrading pe-razor-server. Affected releases are Puppet Enterprise: 2018.1.x versions prior to 2018.1.1 and razor-server and pe-razor-server prior to 1.9.0.0. Las versión anterior de Puppet Enterprise 2018.1 es vulnerable a la ejecución de código inseguro cuando se actualiza pe-razor-server. Las versiones de Puppet Enterprise afectadas son: versiones 2018.1.x anteriores a la 2018.1.1 y razor-server y pe-razor-server... • https://puppet.com/security/cve/CVE-2018-6512 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 8.8EPSS: 0%CPEs: 6EXPL: 0

11 Jun 2018 — Puppet Enterprise 2016.4.x prior to 2016.4.12, Puppet Enterprise 2017.3.x prior to 2017.3.7, Puppet Enterprise 2018.1.x prior to 2018.1.1, Puppet Agent 1.10.x prior to 1.10.13, Puppet Agent 5.3.x prior to 5.3.7, and Puppet Agent 5.5.x prior to 5.5.2, were vulnerable to an attack where an unprivileged user on Windows agents could write custom facts that can escalate privileges on the next puppet run. This was possible through the loading of shared libraries from untrusted paths. Puppet Enterprise en versione... • https://puppet.com/security/cve/CVE-2018-6513 • CWE-426: Untrusted Search Path •

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 0

11 Jun 2018 — In Puppet Agent 1.10.x prior to 1.10.13, Puppet Agent 5.3.x prior to 5.3.7, Puppet Agent 5.5.x prior to 5.5.2, Facter on Windows is vulnerable to a DLL preloading attack, which could lead to a privilege escalation. En Puppet Agent en versiones 1.10.x anteriores a la 1.10.13, Puppet Agent 5.3.x anteriores a la 5.3.7, Puppet Agent 5.5.x anteriores a la 5.5.2, Facter en Windows es vulnerable a un ataque de precarga de DLL, lo que podría conducir a un escalado de privilegios. • https://puppet.com/security/cve/CVE-2018-6514 • CWE-426: Untrusted Search Path •

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 0

11 Jun 2018 — Puppet Agent 1.10.x prior to 1.10.13, Puppet Agent 5.3.x prior to 5.3.7, and Puppet Agent 5.5.x prior to 5.5.2 on Windows only, with a specially crafted configuration file an attacker could get pxp-agent to load arbitrary code with privilege escalation. En Puppet Agent en versiones 1.10.x anteriores a la 1.10.13, Puppet Agent 5.3.x anteriores a la 5.3.7, Puppet Agent 5.5.x anteriores a la 5.5.2 solo en Windows, con un archivo de configuración especialmente manipulado, un atacante podría hacer que pxp-agent ... • https://puppet.com/security/cve/CVE-2018-6515 • CWE-20: Improper Input Validation •