CVE-2016-5714Improper Access Control in Agent

Severity
7.2HIGHNVD
EPSS
1.0%
top 22.86%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 18
Latest updateMay 24

Description

Puppet Enterprise 2015.3.3 and 2016.x before 2016.4.0, and Puppet Agent 1.3.6 through 1.7.0 allow remote attackers to bypass a host whitelist protection mechanism and execute arbitrary code on Puppet nodes via vectors related to command validation, aka "Puppet Execution Protocol (PXP) Command Whitelist Validation Vulnerability."

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:HExploitability: 1.2 | Impact: 5.9

Affected Packages3 packages

NVDpuppet/puppet_agent1.3.61.7.0
NVDpuppet/puppet_enterprise5 versions+4
Debianpuppet/puppet< 4.8.0-1

🔴Vulnerability Details

3
GHSA
GHSA-4h9c-3928-3w6h: Puppet Enterprise 20152022-05-24
OSV
CVE-2016-5714: Puppet Enterprise 20152017-10-18
CVEList
CVE-2016-5714: Puppet Enterprise 20152017-10-18

📋Vendor Advisories

1
Debian
CVE-2016-5714: puppet - Puppet Enterprise 2015.3.3 and 2016.x before 2016.4.0, and Puppet Agent 1.3.6 th...2016
CVE-2016-5714 — Improper Access Control in Puppet Agent | cvebase