← Retour aux CVEs
CVE-2016-5714
HIGH7.2
Description
Puppet Enterprise 2015.3.3 and 2016.x before 2016.4.0, and Puppet Agent 1.3.6 through 1.7.0 allow remote attackers to bypass a host whitelist protection mechanism and execute arbitrary code on Puppet nodes via vectors related to command validation, aka "Puppet Execution Protocol (PXP) Command Whitelist Validation Vulnerability."
Details CVE
Score CVSS v3.17.2
SeveriteHIGH
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisHIGH
Interaction utilisateurNONE
Publie10/18/2017
Derniere modification4/20/2025
Sourcenvd
Observations honeypot0
Produits affectes
puppet:puppet_agentpuppet:puppet_enterprise
Faiblesses (CWE)
CWE-284
References
https://bugs.gentoo.org/597684(cve@mitre.org)
https://puppet.com/security/cve/cve-2016-5714(cve@mitre.org)
https://puppet.com/security/cve/pxp-agent-oct-2016(cve@mitre.org)
https://security.gentoo.org/glsa/201710-12(cve@mitre.org)
https://bugs.gentoo.org/597684(af854a3a-2127-422b-91ae-364da2661108)
https://puppet.com/security/cve/cve-2016-5714(af854a3a-2127-422b-91ae-364da2661108)
https://puppet.com/security/cve/pxp-agent-oct-2016(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/201710-12(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.