First published: Mon Apr 11 2016(Updated: )
Puppet Enterprise 2015.3 before 2015.3.1 allows remote attackers to bypass a host whitelist protection mechanism by leveraging the Puppet communications protocol.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Puppet Enterprise | =2015.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-7330 has a medium severity rating due to the potential for remote exploitation.
To fix CVE-2015-7330, upgrade to Puppet Enterprise version 2015.3.1 or later.
CVE-2015-7330 addresses a vulnerability that allows attackers to bypass host whitelist protections.
CVE-2015-7330 affects Puppet Enterprise 2015.3.0 and earlier versions.
The impact of CVE-2015-7330 includes unauthorized actions due to the bypass of security mechanisms.