Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-2785

Опубликовано: 26 апр. 2016
Источник: redhat
CVSS2: 5
EPSS Низкий

Описание

Puppet Server before 2.3.2 and Ruby puppetmaster in Puppet 4.x before 4.4.2 and in Puppet Agent before 1.4.2 might allow remote attackers to bypass intended auth.conf access restrictions by leveraging incorrect URL decoding.

Отчет

This issue did not affect the versions of Puppet as shipped with various Red Hat products as they did not include support Puppet 3.x (using Passenger 4.x).

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
OpenStack ForemanpuppetWill not fix
Red Hat Ceph Storage 1.3puppetNot affected
Red Hat Enterprise Linux OpenStack Platform 5 (Icehouse)puppetWill not fix
Red Hat Enterprise Linux OpenStack Platform 6 (Juno)puppetWill not fix
Red Hat Enterprise Linux OpenStack Platform 6 (Juno) InstallerpuppetWill not fix
Red Hat Enterprise Linux OpenStack Platform 7 (Kilo)puppetWill not fix
Red Hat OpenStack Platform 8 (Liberty)puppetWill not fix
Red Hat Satellite 6puppetNot affected
Red Hat Subscription Asset ManagerpuppetNot affected

Показывать по

Дополнительная информация

Статус:

Low

EPSS

Процентиль: 38%
0.0017
Низкий

5 Medium

CVSS2

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 9 лет назад

Puppet Server before 2.3.2 and Ruby puppetmaster in Puppet 4.x before 4.4.2 and in Puppet Agent before 1.4.2 might allow remote attackers to bypass intended auth.conf access restrictions by leveraging incorrect URL decoding.

CVSS3: 9.8
nvd
больше 9 лет назад

Puppet Server before 2.3.2 and Ruby puppetmaster in Puppet 4.x before 4.4.2 and in Puppet Agent before 1.4.2 might allow remote attackers to bypass intended auth.conf access restrictions by leveraging incorrect URL decoding.

CVSS3: 9.8
debian
больше 9 лет назад

Puppet Server before 2.3.2 and Ruby puppetmaster in Puppet 4.x before ...

CVSS3: 9.8
github
больше 3 лет назад

Puppet Improper Access Control

EPSS

Процентиль: 38%
0.0017
Низкий

5 Medium

CVSS2