35 results (0.008 seconds)

CVSS: 5.3EPSS: 0%CPEs: 2EXPL: 0

The Puppet Communications Protocol in Puppet Enterprise 2015.3.x before 2015.3.3 does not properly validate certificates for the broker node, which allows remote non-whitelisted hosts to prevent runs from triggering via unspecified vectors. Puppet Communications Protocol en Puppet Enterprise 2015.3.x en versiones anteriores a 2015.3.3 no valida adecuadamente certificados para el nodo broker, lo que permite a anfitriones remotos no incluidos en la lista blanca prevenir que ejecuciones se desencadenen a través de vectores no especificados. • https://puppet.com/security/cve/CVE-2016-2787 • CWE-284: Improper Access Control •

CVSS: 6.6EPSS: 0%CPEs: 1EXPL: 0

The mcollective-puppet-agent plugin before 1.11.1 for Puppet allows remote attackers to execute arbitrary code via vectors involving the --server argument. El plugin mcollective-puppet-agent en versiones anteriores a 1.11.1 para Puppet permite a atacantes remotos ejecutar código arbitrario a través de vectores que implican el argumento --server. • http://www.securityfocus.com/bid/92432 https://puppet.com/security/cve/cve-2015-7331 • CWE-254: 7PK - Security Features •

CVSS: 2.1EPSS: 0%CPEs: 70EXPL: 0

Puppet Labs Facter 1.6.0 through 2.4.0 allows local users to obtains sensitive Amazon EC2 IAM instance metadata by reading a fact for an Amazon EC2 node. Puppet Labs Facter 1.6.0 hasta 2.4.0 permite a usuarios locales obtener metadatos sensibles de la instancia Amazon EC2 IAM mediante la lectura de un hecho para un nodo de Amazon EC2. • http://puppetlabs.com/security/cve/cve-2015-1426 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 6.2EPSS: 0%CPEs: 15EXPL: 1

Untrusted search path vulnerability in Puppet Enterprise 2.8 before 2.8.7, Puppet before 2.7.26 and 3.x before 3.6.2, Facter 1.6.x and 2.x before 2.0.2, Hiera before 1.3.4, and Mcollective before 2.5.2, when running with Ruby 1.9.1 or earlier, allows local users to gain privileges via a Trojan horse file in the current working directory, as demonstrated using (1) rubygems/defaults/operating_system.rb, (2) Win32API.rb, (3) Win32API.so, (4) safe_yaml.rb, (5) safe_yaml/deep.rb, or (6) safe_yaml/deep.so; or (7) operatingsystem.rb, (8) operatingsystem.so, (9) osfamily.rb, or (10) osfamily.so in puppet/confine. Vulnerabilidad de ruta de búsqueda no confiable en Puppet Enterprise 2.8 anterior a 2.8.7, Puppet anterior a 2.7.26 y 3.x anterior a 3.6.2, Facter 1.6.x y 2.x anterior a 2.0.2, Hiera anterior a 1.3.4, y Mcollective anterior a 2.5.2 o anteriores, permite a usuarios locales ganar privilegios ubicando un troyano en el directorio actual a través de un troyano en un archivo, se demostró usando (1) rubygems/defaults/operating_system.rb, (2) Win32API.rb, (3) Win32API.so, (4) safe_yaml.rb, (5) safe_yaml/deep.rb, o (6) safe_yaml/deep.so; o (7) operatingsystem.rb, (8) operatingsystem.so, (9) osfamily.rb, o (10) osfamily.so en puppet/confine. • http://puppetlabs.com/security/cve/cve-2014-3248 http://rowediness.com/2014/06/13/cve-2014-3248-a-little-problem-with-puppet http://secunia.com/advisories/59197 http://secunia.com/advisories/59200 http://www.securityfocus.com/bid/68035 • CWE-17: DEPRECATED: Code •

CVSS: 4.4EPSS: 0%CPEs: 2EXPL: 0

The MCollective aes_security plugin, as used in Puppet Enterprise before 3.3.0 and Mcollective before 2.5.3, does not properly validate new server certificates based on the CA certificate, which allows local users to establish unauthorized Mcollective connections via unspecified vectors related to a race condition. El plugin MCollective aes_security, utilizado en Puppet Enterprise anterior a 3.3.0 y Mcollective anterior a 2.5.3, no valida debidamente los certificados de servidores nuevos basado en el certificado CA, lo que permite a usuarios locales establecer conexiones Mcollective no autorizadas a través de vectores no especificados relacionados con una condición de carrera. • http://puppetlabs.com/security/cve/cve-2014-3251 http://secunia.com/advisories/59356 http://secunia.com/advisories/60066 http://www.osvdb.org/109257 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •