Vulnerability Details : CVE-2016-2785
Puppet Server before 2.3.2 and Ruby puppetmaster in Puppet 4.x before 4.4.2 and in Puppet Agent before 1.4.2 might allow remote attackers to bypass intended auth.conf access restrictions by leveraging incorrect URL decoding.
Products affected by CVE-2016-2785
- cpe:2.3:a:puppet:puppet:4.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:puppet:puppet:4.0.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:puppet:puppet:4.0.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:puppet:puppet:4.0.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:puppet:puppet:4.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:puppet:puppet:4.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:puppet:puppet:4.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:puppet:puppet:4.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:puppet:puppet:4.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:puppet:puppet:4.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:puppet:puppet:4.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:puppet:puppet:4.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:puppet:puppet:4.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:puppet:puppet:4.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:puppet:puppet_server:2.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:puppet:puppet_server:2.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:puppet:puppet_server:2.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:puppet:puppet_server:2.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:puppet:puppet_server:2.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:puppet:puppet_server:2.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:puppet:puppet_server:2.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:puppet:puppet_agent:1.4.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2016-2785
0.09%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 23 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-2785
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST | |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2016-2785
-
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-2785
-
https://security.gentoo.org/glsa/201606-02
Puppet Server and Agent: Multiple vulnerabilities (GLSA 201606-02) — Gentoo securityThird Party Advisory
-
https://github.com/puppetlabs/puppet/pull/4921/commits/8d2ce797db265720f0a20d1d46ee2757b4e4f6b2
(maint) merge-back for work for CVE-2016-2785 by underscorgan · Pull Request #4921 · puppetlabs/puppet · GitHubVendor Advisory
-
https://puppet.com/security/cve/cve-2016-2785
CVE-2016-2785 - Incorrect URL Decoding | PuppetVendor Advisory
Jump to