Page 5 of 59 results (0.006 seconds)

CVSS: 6.1EPSS: 0%CPEs: 7EXPL: 0

20 Aug 2013 — Open redirect vulnerability in the login page in Puppet Enterprise before 3.0.1 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the service parameter. Vulnerabilidad de redirección abierta en la página de login de Puppet Enterprise anterior a 3.0.1, permite a atacantes remotos redireccionar a usuarios a sitios web arbitrarios y llevar a cabo ataques de phishing a través de una URL en el parámetro "service". • http://puppetlabs.com/security/cve/cve-2013-4955 • CWE-20: Improper Input Validation •

CVSS: 9.8EPSS: 0%CPEs: 7EXPL: 0

20 Aug 2013 — Puppet Enterprise before 3.0.1 does not use a session timeout, which makes it easier for attackers to gain privileges by leveraging an unattended workstation. Puppet Enterprise anterior a 3.0.1, no utiliza un timeout para las sesiones, lo que facilita a atacantes la obtención de privilegios aprovechando un PC desatendido físicamente. • http://puppetlabs.com/security/cve/cve-2013-4958 • CWE-287: Improper Authentication •

CVSS: 7.5EPSS: 0%CPEs: 7EXPL: 0

20 Aug 2013 — Puppet Enterprise before 3.0.1 allows remote attackers to obtain the database password via vectors related to how the password is "seeded as a console parameter," External Node Classifiers, and the lack of access control for /nodes. Puppet Enterprise 3.0.1, permite a atacantes remotos obtener la contraseña de la base de datos a través de vectores relacionados con cómo las contraseñas "son pasadas como parámetros de consola", External Node Classifiers y la falta de control de acceso para /nodos. • http://puppetlabs.com/security/cve/cve-2013-4967 • CWE-255: Credentials Management Errors •

CVSS: 7.5EPSS: 11%CPEs: 41EXPL: 0

19 Jun 2013 — Puppet 2.7.x before 2.7.22 and 3.2.x before 3.2.2, and Puppet Enterprise before 2.8.2, deserializes untrusted YAML, which allows remote attackers to instantiate arbitrary Ruby classes and execute arbitrary code via a crafted REST API call. Puppet 2.7.x anterior a 2.7.22 y 3.2.x anterior a 3.2.2, y Puppet Enterprise anterior a 2.8.2, deserializa YAML sin confianza, lo que permite a atacantes remotos la instanciación de clases de Ruby y ejecutar código arbitrario a través de una llamada RESTAPI manipulada. Pu... • http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00002.html • CWE-20: Improper Input Validation CWE-502: Deserialization of Untrusted Data •

CVSS: 7.5EPSS: 0%CPEs: 9EXPL: 0

10 Apr 2013 — Puppet Labs Puppet Enterprise before 2.8.0 does not use a "randomized secret" in the CAS client config file (cas_client_config.yml) when upgrading from older 1.2.x or 2.0.x versions, which allows remote attackers to obtain console access via a crafted cookie. Puppet Labs Puppet Enterprise antes de v2.8.0 no utiliza un "secreto aleatorio" en el archivo de configuración de cliente de CAS (cas_client_config.yml) que al actualizarse desde versiones v1.2.x v2.0.x o, permite a atacantes remotos obtener acceso a l... • http://secunia.com/advisories/52862 • CWE-310: Cryptographic Issues •

CVSS: 7.5EPSS: 0%CPEs: 35EXPL: 0

20 Mar 2013 — Puppet 2.7.x before 2.7.21 and 3.1.x before 3.1.1, when running Ruby 1.9.3 or later, allows remote attackers to execute arbitrary code via vectors related to "serialized attributes." Puppet v2.7.x anterior a v2.7.21 y 3.1.x anterior a v3.1.1, cuando ejecutan Ruby v1.9.3 o posterior, permite a atacantes remotos ejecutar código arbitario mediante vectores relacionados con "serialized attributes." Multiple vulnerabilities have been found in Puppet, the worst of which could lead to execution of arbitrary code. ... • http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00004.html • CWE-20: Improper Input Validation •

CVSS: 9.0EPSS: 1%CPEs: 9EXPL: 0

20 Mar 2013 — The (1) template and (2) inline_template functions in the master server in Puppet before 2.6.18, 2.7.x before 2.7.21, and 3.1.x before 3.1.1, and Puppet Enterprise before 1.2.7 and 2.7.x before 2.7.2 allows remote authenticated users to execute arbitrary code via a crafted catalog request. La funciones (1) template y (2) inline_template en el servidor maestro en Puppet anterior a v2.6.18, v2.7.x anterior a v2.7.21, y v3.1.x anterior a v3.1.1, permite a usuarios remotos autenticados ejecutar código arbitrari... • http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00004.html • CWE-502: Deserialization of Untrusted Data •

CVSS: 4.0EPSS: 0%CPEs: 17EXPL: 1

06 Aug 2012 — lib/puppet/defaults.rb in Puppet 2.7.x before 2.7.18, and Puppet Enterprise before 2.5.2, uses 0644 permissions for last_run_report.yaml, which allows local users to obtain sensitive configuration information by leveraging access to the puppet master server to read this file. lib/puppet/defaults.rb en Puppet 2.7.x anterior a 2.7.18, y Puppet Enterprise anterior a 2.5.2, emplea permisos del tipo 0644 para last_run_report.yaml, lo que permite a usuarios locales obtener información sensible de la configuración... • http://lists.opensuse.org/opensuse-updates/2012-07/msg00036.html • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 4.3EPSS: 0%CPEs: 35EXPL: 2

06 Aug 2012 — Puppet before 2.6.17 and 2.7.x before 2.7.18, and Puppet Enterprise before 2.5.2, allows remote authenticated users to read arbitrary files on the puppet master server by leveraging an arbitrary user's certificate and private key in a GET request. Puppet anterior a v2.6.17 y v2.7.x anterior a v2.7.18 y Puppet Enterprise anterior a v2.5.2, permite a usuarios remotos autenticados a leer ficheros de su elección en el servidor maestro de Puppet aprovechando un certificado de usuario y una clave privada en una p... • http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00006.html • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 3.5EPSS: 2%CPEs: 34EXPL: 2

06 Aug 2012 — Directory traversal vulnerability in lib/puppet/reports/store.rb in Puppet before 2.6.17 and 2.7.x before 2.7.18, and Puppet Enterprise before 2.5.2, when Delete is enabled in auth.conf, allows remote authenticated users to delete arbitrary files on the puppet master server via a .. (dot dot) in a node name. Vulnerabilidad de directorio transversal en lib/puppet/reports/store.rb en Puppet anterior a v2.6.17 y v2.7.x anterior a v2.7.18, y Puppet Enterprise anterior a v2.5.2, cuando Eliminar está habilitado e... • http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00006.html • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •