CVE-2020-7942 — Improper Certificate Validation in Puppet
Severity
6.5MEDIUMNVD
EPSS
0.1%
top 69.21%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 19
Latest updateApr 13
Description
Previously, Puppet operated on a model that a node with a valid certificate was entitled to all information in the system and that a compromised certificate allowed access to everything in the infrastructure. When a node's catalog falls back to the `default` node, the catalog can be retrieved for a different node by modifying facts for the Puppet run. This issue can be mitigated by setting `strict_hostname_checking = true` in `puppet.conf` on your Puppet master. Puppet 6.13.0 and 5.5.19 changes …
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 2.8 | Impact: 3.6
Affected Packages5 packages
🔴Vulnerability Details
4CVEList▶
CVE-2020-7942: Previously, Puppet operated on a model that a node with a valid certificate was entitled to all information in the system and that a compromised certi↗2020-02-19
OSV▶
CVE-2020-7942: Previously, Puppet operated on a model that a node with a valid certificate was entitled to all information in the system and that a compromised certi↗2020-02-19