CVE-2020-7942
Published Feb 19, 2020
Last updated 3 years ago
Overview
- Description
- Previously, Puppet operated on a model that a node with a valid certificate was entitled to all information in the system and that a compromised certificate allowed access to everything in the infrastructure. When a node's catalog falls back to the `default` node, the catalog can be retrieved for a different node by modifying facts for the Puppet run. This issue can be mitigated by setting `strict_hostname_checking = true` in `puppet.conf` on your Puppet master. Puppet 6.13.0 and 5.5.19 changes the default behavior for strict_hostname_checking from false to true. It is recommended that Puppet Open Source and Puppet Enterprise users that are not upgrading still set strict_hostname_checking to true to ensure secure behavior. Affected software versions: Puppet 6.x prior to 6.13.0 Puppet Agent 6.x prior to 6.13.0 Puppet 5.5.x prior to 5.5.19 Puppet Agent 5.5.x prior to 5.5.19 Resolved in: Puppet 6.13.0 Puppet Agent 6.13.0 Puppet 5.5.19 Puppet Agent 5.5.19
- Source
- security@puppet.com
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 6.5
- Impact score
- 3.6
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 4
- Impact score
- 2.9
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- CWE-295
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:puppet:puppet:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E1316D93-D540-4E07-97B9-0FD9DAC19D5E", "versionEndExcluding": "5.5.19", "versionStartIncluding": "5.5.0" }, { "criteria": "cpe:2.3:a:puppet:puppet:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2A32C5AF-A28C-464B-949D-570BD98D36C9", "versionEndExcluding": "6.13.0", "versionStartIncluding": "6.0.0" }, { "criteria": "cpe:2.3:a:puppet:puppet_agent:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "09EAB60C-0BE2-4FCA-9867-2D6CA4F84F35", "versionEndExcluding": "5.5.19", "versionStartIncluding": "5.5.0" }, { "criteria": "cpe:2.3:a:puppet:puppet_agent:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C76E5E7E-185B-48E7-AC61-C7F97F1B46BC", "versionEndExcluding": "6.13.0", "versionStartIncluding": "6.0.0" } ], "operator": "OR" } ] } ]