2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2016-2785" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2016-06-10T15:59:00.140" ,
2025-04-12 12:06:01 +00:00
"lastModified" : "2025-04-12T10:46:40.837" ,
"vulnStatus" : "Deferred" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Puppet Server before 2.3.2 and Ruby puppetmaster in Puppet 4.x before 4.4.2 and in Puppet Agent before 1.4.2 might allow remote attackers to bypass intended auth.conf access restrictions by leveraging incorrect URL decoding."
} ,
{
"lang" : "es" ,
"value" : "Puppet Server en versiones anteriores a 2.3.2 y Ruby puppetmaster en Puppet 4.x en versiones anteriores a 4.4.2 y en Puppet Agent en versiones anteriores a 1.4.2 podr\u00eda permitir a atacantes remotos eludir las restricciones destinas al acceso auth.conf aprovechando una decodificaci\u00f3n URL incorrecta."
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" ,
2024-11-23 05:11:48 +00:00
"baseScore" : 9.8 ,
"baseSeverity" : "CRITICAL" ,
2023-04-24 12:24:31 +02:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-11-23 05:11:48 +00:00
"availabilityImpact" : "HIGH"
2023-04-24 12:24:31 +02:00
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 5.9
}
] ,
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P" ,
2024-11-23 05:11:48 +00:00
"baseScore" : 7.5 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "PARTIAL" ,
2024-11-23 05:11:48 +00:00
"availabilityImpact" : "PARTIAL"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "HIGH" ,
"exploitabilityScore" : 10.0 ,
"impactScore" : 6.4 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-284"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:puppet:puppet:4.0.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A11509AE-D08C-46AE-8D47-20E74818CBE6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:puppet:puppet:4.0.0:rc1:*:*:*:*:*:*" ,
"matchCriteriaId" : "CA7AF7F2-94E6-4878-927B-C21631C98552"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:puppet:puppet:4.0.0:rc2:*:*:*:*:*:*" ,
"matchCriteriaId" : "8FB7FA1B-B7F7-4969-80F9-6A915B513187"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:puppet:puppet:4.0.0:rc3:*:*:*:*:*:*" ,
"matchCriteriaId" : "122339DA-E6C1-4F7A-8D41-28C254F3F7F4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:puppet:puppet:4.1.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "68A51928-A68D-4A73-B6D0-D5C1DDEC6458"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:puppet:puppet:4.2.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4E88DAC8-E363-424D-8DEF-4471A0B8BCE7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:puppet:puppet:4.2.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "22C3FECF-C94E-4AE8-B461-BC3A3C31B723"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:puppet:puppet:4.2.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F5B5CAF9-9CFF-4E16-94FA-3A30457F294F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:puppet:puppet:4.2.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C6C8611A-D412-4290-A549-63B927CE607E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:puppet:puppet:4.3.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9BE53A43-1311-4276-B6D3-A116EDD4596D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:puppet:puppet:4.3.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D88EB0D2-E1BE-4A96-BFE3-EC30F6F94DEA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:puppet:puppet:4.3.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "391B0EF3-C49C-4479-96BF-DAC83C4B7960"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:puppet:puppet:4.4.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5E40E02A-C633-4EF1-964F-D58D6B69FF57"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:puppet:puppet:4.4.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FE00E2D2-A880-4FAD-8514-68D92F45BB6E"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:puppet:puppet_server:2.0.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EC4D00D8-6A01-4BE0-BD10-EDBBB716C0B5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:puppet:puppet_server:2.1.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EEC046DE-8D52-475D-9FB8-833FCA324432"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:puppet:puppet_server:2.1.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "508E4ED0-42DD-4886-BF38-E1B38A8A1535"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:puppet:puppet_server:2.1.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F9B03168-8F2B-4E97-8CF6-ACCD6BD5E97A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:puppet:puppet_server:2.2.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2BC34CE8-8586-4763-AB70-8D6C7E64CF87"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:puppet:puppet_server:2.3.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2D605861-8208-4051-8ABD-E6D6202BE243"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:puppet:puppet_server:2.3.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5F392771-D087-4B17-9CEA-E599ECC08C38"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:puppet:puppet_agent:1.4.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D66C57AB-F8E2-4817-8912-1D7EB4EB63FC"
}
]
}
]
}
] ,
"references" : [
{
"url" : "https://github.com/puppetlabs/puppet/pull/4921/commits/8d2ce797db265720f0a20d1d46ee2757b4e4f6b2" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "https://puppet.com/security/cve/cve-2016-2785" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "https://security.gentoo.org/glsa/201606-02" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
2024-11-23 05:11:48 +00:00
} ,
{
"url" : "https://github.com/puppetlabs/puppet/pull/4921/commits/8d2ce797db265720f0a20d1d46ee2757b4e4f6b2" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "https://puppet.com/security/cve/cve-2016-2785" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "https://security.gentoo.org/glsa/201606-02" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
2023-04-24 12:24:31 +02:00
}
]
}