First published: Tue Sep 07 2021(Updated: )
A flaw was discovered in bolt-server and ace where running a task with sensitive parameters results in those sensitive parameters being logged when they should not be. This issue only affects SSH/WinRM nodes (inventory service nodes).
Credit: security@puppet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Puppet | >=2021.0.0<2021.3.0 | |
Puppet Enterprise | <2019.8.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this flaw is CVE-2021-27022.
The affected software includes Puppet Puppet versions between 2021.0.0 and 2021.3.0, as well as Puppet Puppet Enterprise versions up to 2019.8.8.
CVE-2021-27022 has a severity rating of 4.9, which is considered medium.
A flaw was discovered in bolt-server and ace where running a task with sensitive parameters results in those sensitive parameters being logged when they should not be. This issue only affects SSH/WinRM nodes (inventory service nodes).
You can find more information about CVE-2021-27022 on the Puppet Security website at https://puppet.com/security/cve/cve-2021-27022/.