- Description
- Puppet Enterprise 2015.3.3 and 2016.x before 2016.4.0, and Puppet Agent 1.3.6 through 1.7.0 allow remote attackers to bypass a host whitelist protection mechanism and execute arbitrary code on Puppet nodes via vectors related to command validation, aka "Puppet Execution Protocol (PXP) Command Whitelist Validation Vulnerability."
- Source
- cve@mitre.org
- NVD status
- Modified
CVSS 3.1
- Type
- Primary
- Base score
- 7.2
- Impact score
- 5.9
- Exploitability score
- 1.2
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 6.5
- Impact score
- 6.4
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:P/I:P/A:P
- nvd@nist.gov
- CWE-284
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:puppet:puppet_enterprise:2015.3.3:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "0C5CAE21-41D1-4AE6-BA93-3DB6DAE8A743"
},
{
"criteria": "cpe:2.3:a:puppet:puppet_enterprise:2016.1.1:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "12807AD1-C455-421C-ABCB-A0CFF7C10DC9"
},
{
"criteria": "cpe:2.3:a:puppet:puppet_enterprise:2016.1.2:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "F8566880-B247-47CA-BAE1-251A3DADDC04"
},
{
"criteria": "cpe:2.3:a:puppet:puppet_enterprise:2016.2.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "F2896082-1228-4A6C-BE47-D1CB4916DBA5"
},
{
"criteria": "cpe:2.3:a:puppet:puppet_enterprise:2016.2.1:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "9D4A193B-8FC2-4E73-9FD2-5A4FCD9A0291"
}
],
"operator": "OR"
}
]
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:puppet:puppet_agent:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "5D77E81E-0AE8-40BC-BF58-7C7A3C845AFE",
"versionEndIncluding": "1.7.0",
"versionStartIncluding": "1.3.6"
}
],
"operator": "OR"
}
]
}
]