Page 6 of 89 results (0.005 seconds)

CVSS: 7.5EPSS: 0%CPEs: 5EXPL: 0

Puppet Enterprise versions prior to 2016.4.5 and 2017.2.1 did not correctly authenticate users before returning labeled RBAC access tokens. This issue has been fixed in Puppet Enterprise 2016.4.5 and 2017.2.1. This only affects users with labeled tokens, which is not the default for tokens. Puppet Enterprise en versiones anteriores a la 2016.4.5 y 2017.2.1 no autenticaba correctamente los usuarios antes de devolver los tokens de acceso RBAC etiquetados. Este problema se ha solucionado en Puppet Enterprise 2016.4.5 y 2017.2.1. • https://puppet.com/security/cve/cve-2017-2297 • CWE-287: Improper Authentication •

CVSS: 6.8EPSS: 0%CPEs: 2EXPL: 0

Puppet Enterprise 3.7.x and 3.8.0 might allow remote authenticated users to manage certificates for arbitrary nodes by leveraging a client certificate trusted by the master, aka a "Certificate Authority Reverse Proxy Vulnerability." Puppet Enterprise 3.7.x y 3.8.0 podría permitir que los usuarios autenticados remotos gestionen certificados para nodos arbitrarios utilizando un certificado de cliente considerado como fiable por el maestro. Esta vulnerabilidad también se conoce como "Certificate Authority Reverse Proxy Vulnerability". • https://puppet.com/security/cve/CVE-2015-4100 • CWE-295: Improper Certificate Validation •

CVSS: 6.5EPSS: 0%CPEs: 3EXPL: 0

The console in Puppet Enterprise 3.7.x, 3.8.x, and 2015.2.x does not set the secure flag for the JSESSIONID cookie in an HTTPS session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an HTTP session. La consola en Puppet Enterprise 3.7.x, 3.8.x y 2015.2.x no establece la marca secure para la cookie JSESSIONID en una sesión HTTPS. Esto facilita que atacantes remotos capturen esta cookie interceptando su transmisión en una sesión HTTP. • https://puppet.com/security/cve/CVE-2015-8470 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

Cross-site scripting (XSS) vulnerability in the console in Puppet Enterprise before 2015.2.1 allows remote attackers to inject arbitrary web script or HTML via the string parameter, related to Login Redirect. Vulnerabilidad Cross-Site Scripting (XSS) en la consola en Puppet Enterprise en versiones anteriores a la 2015.2.1 permite que atacantes remotos inyecten scripts web o HTML mediante el parámetro string. Esto se relaciona con Login Redirect. • https://puppet.com/security/cve/CVE-2015-6502 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.2EPSS: 0%CPEs: 6EXPL: 0

Puppet Enterprise 2015.3.3 and 2016.x before 2016.4.0, and Puppet Agent 1.3.6 through 1.7.0 allow remote attackers to bypass a host whitelist protection mechanism and execute arbitrary code on Puppet nodes via vectors related to command validation, aka "Puppet Execution Protocol (PXP) Command Whitelist Validation Vulnerability." Puppet Enterprise 2015.3.3 y 2016.x en versiones anteriores a la 2016.4.0 y Puppet Agent 1.3.6 hasta la versión 1.7.0 permite que atacantes remotos omitan un mecanismo de protección de listas blancas de host y ejecutar código arbitrario en nodos Puppet mediante vectores relacionados con la validación de comandos. Esto también se conoce como "Puppet Execution Protocol (PXP) Command Whitelist Validation Vulnerability". • https://bugs.gentoo.org/597684 https://puppet.com/security/cve/cve-2016-5714 https://puppet.com/security/cve/pxp-agent-oct-2016 https://security.gentoo.org/glsa/201710-12 • CWE-284: Improper Access Control •