CVE-2020-7942

Source
https://nvd.nist.gov/vuln/detail/CVE-2020-7942
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-7942.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2020-7942
Aliases
Related
Published
2020-02-19T21:15:11Z
Modified
2024-09-03T03:33:07.485757Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

Previously, Puppet operated on a model that a node with a valid certificate was entitled to all information in the system and that a compromised certificate allowed access to everything in the infrastructure. When a node's catalog falls back to the default node, the catalog can be retrieved for a different node by modifying facts for the Puppet run. This issue can be mitigated by setting strict_hostname_checking = true in puppet.conf on your Puppet master. Puppet 6.13.0 and 5.5.19 changes the default behavior for stricthostnamechecking from false to true. It is recommended that Puppet Open Source and Puppet Enterprise users that are not upgrading still set stricthostnamechecking to true to ensure secure behavior. Affected software versions: Puppet 6.x prior to 6.13.0 Puppet Agent 6.x prior to 6.13.0 Puppet 5.5.x prior to 5.5.19 Puppet Agent 5.5.x prior to 5.5.19 Resolved in: Puppet 6.13.0 Puppet Agent 6.13.0 Puppet 5.5.19 Puppet Agent 5.5.19

References

Affected packages

Debian:11 / puppet

Package

Name
puppet
Purl
pkg:deb/debian/puppet?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.5.22-2
5.5.22-2.1
5.5.22-2.2
5.5.22-3
5.5.22-4

6.*

6.16.0-1

Ecosystem specific

{
    "urgency": "unimportant"
}

Git / github.com/puppetlabs/puppet

Affected ranges

Type
GIT
Repo
https://github.com/puppetlabs/puppet
Events
Type
GIT
Repo
https://github.com/puppetlabs/puppet-agent
Events

Affected versions

1.*

1.10.11
1.10.12
1.10.13
1.10.14
1.10.15

4.*

4.10.11
4.10.12
4.10.13

5.*

5.3.6
5.3.7
5.3.8
5.5.0
5.5.1
5.5.10
5.5.11
5.5.12
5.5.13
5.5.14
5.5.15
5.5.16
5.5.17
5.5.18
5.5.2
5.5.3
5.5.4
5.5.6
5.5.7
5.5.8
5.5.9