Puppet Enterprise 2015.3.3 and 2016.x before 2016.4.0, and Puppet Agent 1.3.6 through 1.7.0 allow remote attackers to bypass a host whitelist protection mechanism and execute arbitrary code on Puppet nodes via vectors related to command validation, aka "Puppet Execution Protocol (PXP) Command Whitelist Validation Vulnerability."
2017-10-18T18:29:00.360
2025-04-20T01:37:25.860
Deferred
CVSSv3.1: 7.2 (HIGH)
AV:N/AC:L/Au:S/C:P/I:P/A:P
8.0
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | puppet | puppet_enterprise | 2015.3.3 | Yes |
Application | puppet | puppet_enterprise | 2016.1.1 | Yes |
Application | puppet | puppet_enterprise | 2016.1.2 | Yes |
Application | puppet | puppet_enterprise | 2016.2.0 | Yes |
Application | puppet | puppet_enterprise | 2016.2.1 | Yes |
Application | puppet | puppet_agent | ≤ 1.7.0 | Yes |