The console in Puppet Enterprise 2015.x and 2016.x prior to 2016.4.0 includes unsafe string reads that potentially allows for remote code execution on the console node.
The product uses a function that accepts a format string as an argument, but the format string originates from an external source.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Puppet_enterprise | Puppet | 2015.2.0 (including) | 2015.2.0 (including) |
Puppet_enterprise | Puppet | 2015.2.1 (including) | 2015.2.1 (including) |
Puppet_enterprise | Puppet | 2015.2.2 (including) | 2015.2.2 (including) |
Puppet_enterprise | Puppet | 2015.2.3 (including) | 2015.2.3 (including) |
Puppet_enterprise | Puppet | 2015.3.0 (including) | 2015.3.0 (including) |
Puppet_enterprise | Puppet | 2015.3.1 (including) | 2015.3.1 (including) |
Puppet_enterprise | Puppet | 2015.3.2 (including) | 2015.3.2 (including) |
Puppet_enterprise | Puppet | 2015.3.3 (including) | 2015.3.3 (including) |
Puppet_enterprise | Puppet | 2016.1.1 (including) | 2016.1.1 (including) |
Puppet_enterprise | Puppet | 2016.1.2 (including) | 2016.1.2 (including) |
Puppet_enterprise | Puppet | 2016.2.0 (including) | 2016.2.0 (including) |
Puppet_enterprise | Puppet | 2016.2.1 (including) | 2016.2.1 (including) |