First published: Thu May 04 2023(Updated: )
A Regular Expression Denial of Service (ReDoS) issue was discovered in Puppet Server 7.9.2 certificate validation. An issue related to specifically crafted certificate names significantly slowed down server operations.
Credit: security@puppet.com security@puppet.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/puppet-server | <7.11.0 | 7.11.0 |
redhat/puppet-server | <8.0.0 | 8.0.0 |
Puppetlabs Puppet Enterprise | =2021.7.1 | |
Puppetlabs Puppet Enterprise | =2023.0 | |
Puppet Puppet Server | =7.9.2 | |
=2021.7.1 | ||
=2023.0 | ||
=7.9.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-1894.
The severity of CVE-2023-1894 is medium with a CVSS score of 5.3.
Puppet Server 7.9.2 and Puppet Enterprise versions 2021.7.1 and 2023.0 are affected by CVE-2023-1894.
CVE-2023-1894 can significantly slow down server operations due to a Regular Expression Denial of Service (ReDoS) issue in certificate validation.
To fix CVE-2023-1894, you should upgrade to a patched version of Puppet Server or Puppet Enterprise as recommended by the vendor.