First published: Fri Jan 16 2015(Updated: )
The puppetlabs-stdlib module 2.1 through 3.0 and 4.1.0 through 4.5.x before 4.5.1 for Puppet 2.8.8 and earlier allows remote authenticated users to gain privileges or obtain sensitive information by prepopulating the fact cache.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Puppet stdlib | =2.1.0 | |
Puppet stdlib | =2.1.1 | |
Puppet stdlib | =2.1.2 | |
Puppet stdlib | =2.1.3 | |
Puppet stdlib | =2.2.0 | |
Puppet stdlib | =2.2.1 | |
Puppet stdlib | =2.3.0 | |
Puppet stdlib | =2.3.1 | |
Puppet stdlib | =2.3.2 | |
Puppet stdlib | =2.3.3 | |
Puppet stdlib | =2.4.0 | |
Puppet stdlib | =2.5.0 | |
Puppet stdlib | =3.0.0 | |
Puppet stdlib | =4.1.0 | |
Puppet stdlib | =4.2.0 | |
Puppet stdlib | =4.2.1 | |
Puppet stdlib | =4.2.2 | |
Puppet stdlib | =4.3.0 | |
Puppet stdlib | =4.3.1 | |
Puppet stdlib | =4.3.2 | |
Puppet stdlib | =4.4.0 | |
Puppet stdlib | =4.5.0 | |
Puppet Enterprise | <=2.8.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1029 has been classified as a medium severity vulnerability.
To fix CVE-2015-1029, upgrade the puppetlabs-stdlib module to version 4.5.1 or later.
Versions 2.1 through 3.0 and 4.1.0 through 4.5.x before 4.5.1 are affected by CVE-2015-1029.
CVE-2015-1029 is a privilege escalation vulnerability that allows remote authenticated users to access sensitive information.
Yes, CVE-2015-1029 can be exploited by remote authenticated users.