First published: Wed Oct 18 2017(Updated: )
Puppet Enterprise 2015.3.3 and 2016.x before 2016.4.0, and Puppet Agent 1.3.6 through 1.7.0 allow remote attackers to bypass a host whitelist protection mechanism and execute arbitrary code on Puppet nodes via vectors related to command validation, aka "Puppet Execution Protocol (PXP) Command Whitelist Validation Vulnerability."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Puppet Puppet Enterprise | =2015.3.3 | |
Puppet Puppet Enterprise | =2016.1.1 | |
Puppet Puppet Enterprise | =2016.1.2 | |
Puppet Puppet Enterprise | =2016.2.0 | |
Puppet Puppet Enterprise | =2016.2.1 | |
Puppet Puppet Agent | >=1.3.6<=1.7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.