First published: Mon Feb 17 2014(Updated: )
Puppet 2.6.0 through 2.6.3 does not properly restrict access to node resources, which allows remote authenticated Puppet nodes to read or modify the resources of other nodes via unspecified vectors.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
rubygems/puppet | >=2.6.0<=2.6.3 | 2.6.4 |
Puppet by Puppet Labs | =2.6.0 | |
Puppet by Puppet Labs | =2.6.1 | |
Puppet by Puppet Labs | =2.6.2 | |
Puppet by Puppet Labs | =2.6.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-0528 is classified as a medium severity vulnerability due to inadequate access restrictions.
To fix CVE-2011-0528, upgrade Puppet to version 2.6.4 or later.
CVE-2011-0528 affects Puppet versions 2.6.0 through 2.6.3.
Yes, CVE-2011-0528 can be exploited by remote authenticated Puppet nodes.
CVE-2011-0528 allows remote authenticated nodes to read or modify the resources of other nodes.