Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4h9c-3928-3w6h

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 7.2

Описание

Puppet Enterprise 2015.3.3 and 2016.x before 2016.4.0, and Puppet Agent 1.3.6 through 1.7.0 allow remote attackers to bypass a host whitelist protection mechanism and execute arbitrary code on Puppet nodes via vectors related to command validation, aka "Puppet Execution Protocol (PXP) Command Whitelist Validation Vulnerability."

Puppet Enterprise 2015.3.3 and 2016.x before 2016.4.0, and Puppet Agent 1.3.6 through 1.7.0 allow remote attackers to bypass a host whitelist protection mechanism and execute arbitrary code on Puppet nodes via vectors related to command validation, aka "Puppet Execution Protocol (PXP) Command Whitelist Validation Vulnerability."

EPSS

Процентиль: 77%
0.0101
Низкий

7.2 High

CVSS3

Дефекты

CWE-284

Связанные уязвимости

CVSS3: 7.2
ubuntu
больше 8 лет назад

Puppet Enterprise 2015.3.3 and 2016.x before 2016.4.0, and Puppet Agent 1.3.6 through 1.7.0 allow remote attackers to bypass a host whitelist protection mechanism and execute arbitrary code on Puppet nodes via vectors related to command validation, aka "Puppet Execution Protocol (PXP) Command Whitelist Validation Vulnerability."

CVSS3: 7.2
nvd
больше 8 лет назад

Puppet Enterprise 2015.3.3 and 2016.x before 2016.4.0, and Puppet Agent 1.3.6 through 1.7.0 allow remote attackers to bypass a host whitelist protection mechanism and execute arbitrary code on Puppet nodes via vectors related to command validation, aka "Puppet Execution Protocol (PXP) Command Whitelist Validation Vulnerability."

CVSS3: 7.2
debian
больше 8 лет назад

Puppet Enterprise 2015.3.3 and 2016.x before 2016.4.0, and Puppet Agen ...

EPSS

Процентиль: 77%
0.0101
Низкий

7.2 High

CVSS3

Дефекты

CWE-284