First published: Wed Apr 10 2013(Updated: )
Puppet Labs Puppet Enterprise before 2.8.0 does not use a "randomized secret" in the CAS client config file (cas_client_config.yml) when upgrading from older 1.2.x or 2.0.x versions, which allows remote attackers to obtain console access via a crafted cookie.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Puppet Puppet Enterprise | <=2.7.2 | |
Puppet Puppet Enterprise | =2.0.0 | |
Puppet Puppet Enterprise | =2.5.1 | |
Puppet Puppet Enterprise | =2.5.2 | |
Puppetlabs Puppet | =1.0.0 | |
Puppetlabs Puppet | =1.1.0 | |
Puppetlabs Puppet | =1.2.0 | |
Puppetlabs Puppet | =2.5.0 | |
Puppetlabs Puppet | =2.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.