First published: Wed Oct 18 2017(Updated: )
Puppet Enterprise 2015.3.3 and 2016.x before 2016.4.0, and Puppet Agent 1.3.6 through 1.7.0 allow remote attackers to bypass a host whitelist protection mechanism and execute arbitrary code on Puppet nodes via vectors related to command validation, aka "Puppet Execution Protocol (PXP) Command Whitelist Validation Vulnerability."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Puppet Enterprise | =2015.3.3 | |
Puppet Enterprise | =2016.1.1 | |
Puppet Enterprise | =2016.1.2 | |
Puppet Enterprise | =2016.2.0 | |
Puppet Enterprise | =2016.2.1 | |
Puppet | >=1.3.6<=1.7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-5714 has been classified with a high severity rating due to its potential for allowing unauthorized code execution.
To remediate CVE-2016-5714, upgrade Puppet Enterprise to version 2016.4.0 or later and ensure that Puppet Agent versions are updated beyond 1.7.0.
CVE-2016-5714 affects users of Puppet Enterprise versions 2015.3.3 and 2016.x before 2016.4.0, as well as Puppet Agent versions 1.3.6 through 1.7.0.
CVE-2016-5714 enables remote attackers to bypass host whitelist protections and execute arbitrary commands on Puppet nodes.
While not a permanent solution, restricting network access to Puppet services can help mitigate risks associated with CVE-2016-5714 until a patch is applied.