VYPR

Puppet Agent

by Puppet (software)

Source repositories

CVEs (10)

  • CVE-2016-5713CriDec 6, 2017
    risk 0.64cvss 9.8epss 0.01

    Versions of Puppet Agent prior to 1.6.0 included a version of the Puppet Execution Protocol (PXP) agent that passed environment variables through to Puppet runs. This could allow unauthorized code to be loaded. This bug was first introduced in Puppet Agent 1.3.0.

  • CVE-2016-2786CriJun 10, 2016
    risk 0.64cvss 9.8epss 0.01

    The pxp-agent component in Puppet Enterprise 2015.3.x before 2015.3.3 and Puppet Agent 1.3.x before 1.3.6 does not properly validate server certificates, which might allow remote attackers to spoof brokers and execute arbitrary commands via a crafted certificate.

  • CVE-2016-2785CriJun 10, 2016
    risk 0.57cvss 9.8epss 0.00

    Puppet Server before 2.3.2 and Ruby puppetmaster in Puppet 4.x before 4.4.2 and in Puppet Agent before 1.4.2 might allow remote attackers to bypass intended auth.conf access restrictions by leveraging incorrect URL decoding.

  • CVE-2016-5714HigOct 18, 2017
    risk 0.47cvss 7.2epss 0.01

    Puppet Enterprise 2015.3.3 and 2016.x before 2016.4.0, and Puppet Agent 1.3.6 through 1.7.0 allow remote attackers to bypass a host whitelist protection mechanism and execute arbitrary code on Puppet nodes via vectors related to command validation, aka "Puppet Execution Protocol…

  • CVE-2021-27017MedFeb 7, 2025
    risk 0.43cvss 6.6epss 0.00

    Utilization of a module presented a security risk by allowing the deserialization of untrusted/user supplied data. This is resolved in the Puppet Agent 7.4.0 release.

  • CVE-2020-7942Feb 19, 2020
    risk 0.00cvss epss 0.00

    Previously, Puppet operated on a model that a node with a valid certificate was entitled to all information in the system and that a compromised certificate allowed access to everything in the infrastructure. When a node's catalog falls back to the `default` node, the catalog…

  • CVE-2018-6515Jun 11, 2018
    risk 0.00cvss epss 0.00

    Puppet Agent 1.10.x prior to 1.10.13, Puppet Agent 5.3.x prior to 5.3.7, and Puppet Agent 5.5.x prior to 5.5.2 on Windows only, with a specially crafted configuration file an attacker could get pxp-agent to load arbitrary code with privilege escalation.

  • CVE-2018-6514Jun 11, 2018
    risk 0.00cvss epss 0.00

    In Puppet Agent 1.10.x prior to 1.10.13, Puppet Agent 5.3.x prior to 5.3.7, Puppet Agent 5.5.x prior to 5.5.2, Facter on Windows is vulnerable to a DLL preloading attack, which could lead to a privilege escalation.

  • CVE-2017-10689Feb 9, 2018
    risk 0.00cvss epss 0.00

    In previous versions of Puppet Agent it was possible to install a module with world writable permissions. Puppet Agent 5.3.4 and 1.10.10 included a fix to this vulnerability.

  • CVE-2017-10690Feb 9, 2018
    risk 0.00cvss epss 0.00

    In previous versions of Puppet Agent it was possible for the agent to retrieve facts from an environment that it was not classified to retrieve from. This was resolved in Puppet Agent 5.3.4, included in Puppet Enterprise 2017.3.4