GHSA-pqj5-7r86-64fv

Suggest an improvement
Source
https://github.com/advisories/GHSA-pqj5-7r86-64fv
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-pqj5-7r86-64fv/GHSA-pqj5-7r86-64fv.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-pqj5-7r86-64fv
Aliases
Published
2022-05-13T01:06:16Z
Modified
2024-02-16T08:03:18.529605Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Puppet Improper Access Control
Details

Puppet Server before 2.3.2 and Ruby puppetmaster in Puppet 4.x before 4.4.2 and in Puppet Agent before 1.4.2 might allow remote attackers to bypass intended auth.conf access restrictions by leveraging incorrect URL decoding.

Database specific
{
    "nvd_published_at": "2016-06-10T15:59:00Z",
    "cwe_ids": [
        "CWE-284"
    ],
    "severity": "CRITICAL",
    "github_reviewed": true,
    "github_reviewed_at": "2023-07-28T19:59:23Z"
}
References

Affected packages

RubyGems / puppet

Package

Name
puppet
Purl
pkg:gem/puppet

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.0.0
Fixed
4.4.2

Affected versions

4.*

4.0.0
4.1.0
4.2.0
4.2.1
4.2.2
4.2.3
4.3.0
4.3.1
4.3.2
4.4.0
4.4.1