CVE-2016-5714
Gentoo Linux Security Advisory 201710-12
Severity Score
Exploit Likelihood
Affected Versions
6Public Exploits
0Exploited in Wild
-Decision
Descriptions
Puppet Enterprise 2015.3.3 and 2016.x before 2016.4.0, and Puppet Agent 1.3.6 through 1.7.0 allow remote attackers to bypass a host whitelist protection mechanism and execute arbitrary code on Puppet nodes via vectors related to command validation, aka "Puppet Execution Protocol (PXP) Command Whitelist Validation Vulnerability."
Puppet Enterprise 2015.3.3 y 2016.x en versiones anteriores a la 2016.4.0 y Puppet Agent 1.3.6 hasta la versión 1.7.0 permite que atacantes remotos omitan un mecanismo de protección de listas blancas de host y ejecutar código arbitrario en nodos Puppet mediante vectores relacionados con la validación de comandos. Esto también se conoce como "Puppet Execution Protocol (PXP) Command Whitelist Validation Vulnerability".
Multiple vulnerabilities have been found in Puppet Agent, the worst of which could result in the execution of arbitrary code. Versions less than 1.7.1 are affected.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2016-06-16 CVE Reserved
- 2017-10-13 CVE Published
- 2024-08-06 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-284: Improper Access Control
CAPEC
References (4)
URL | Date | SRC |
---|
URL | Date | SRC |
---|