CVE-2022-0675
Puppet Firewall Module May Leave Unmanaged Rules
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
In certain situations it is possible for an unmanaged rule to exist on the target system that has the same comment as the rule specified in the manifest. This could allow for unmanaged rules to exist on the target system and leave the system in an unsafe state.
En determinadas situaciones es posible que se presente una regla no administrada en el sistema objetivo que tenga el mismo comentario que la regla especificada en el manifiesto. Esto podrĂa permitir la existencia de reglas no administradas en el sistema objetivo y dejar el sistema en un estado no seguro
A flaw was found in the Puppet Firewall module. In certain situations, an unmanaged rule can exist on the target system that has the same comment as a rule specified in the manifest. When this condition is true, Puppet will ignore the unmanaged rule and continue to apply the rule in the manifest. This issue occurs because the firewall module uses the comment field in IPT as its namevar and therefore expects it to be a unique identifier. In the case of IPT, this is not true, given that you can have multiple rules with the same comment.
An update for puppet-firewall is now available for Red Hat OpenStack Platform 16.2.3 (Train). An issue was address where unmanaged rules could leave the system in an unsafe state via duplicate a comment.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2022-02-17 CVE Reserved
- 2022-03-02 CVE Published
- 2024-08-02 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-20: Improper Input Validation
- CWE-1289: Improper Validation of Unsafe Equivalence in Input
CAPEC
References (3)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://puppet.com/security/cve/CVE-2022-0675 | 2022-03-09 | |
https://access.redhat.com/security/cve/CVE-2022-0675 | 2022-12-07 | |
https://bugzilla.redhat.com/show_bug.cgi?id=2071567 | 2022-12-07 |