mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
237 lines
9.0 KiB
JSON
237 lines
9.0 KiB
JSON
{
|
|
"id": "CVE-2017-2299",
|
|
"sourceIdentifier": "security@puppet.com",
|
|
"published": "2017-09-15T18:29:00.260",
|
|
"lastModified": "2019-10-03T00:03:26.223",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Versions of the puppetlabs-apache module prior to 1.11.1 and 2.1.0 make it very easy to accidentally misconfigure TLS trust. If you specify the `ssl_ca` parameter but do not specify the `ssl_certs_dir` parameter, a default will be provided for the `ssl_certs_dir` that will trust certificates from any of the system-trusted certificate authorities. This did not affect FreeBSD."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Las versiones del m\u00f3dulo puppetlabs-apache anteriores a 1.11.1 y 2.1.0 hacen que sea muy sencillo configurar de forma incorrecta las relaciones de confianza para TLS Si se especifica el par\u00e1metro `ssl_ca` pero no se especifica el par\u00e1metro `ssl_certs_dir`, se proporcionar\u00e1 uno por defecto para `ssl_certs_dir` que confiar\u00e1 en certificados de cualquiera de las autoridades certificadoras de confianza del sistema. Esto no afecta a FreeBSD."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV30": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.0",
|
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 7.5,
|
|
"baseSeverity": "HIGH"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 3.6
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 5.0
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-295"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:puppet:puppetlabs-apache:0.0.4:*:*:*:*:puppet:*:*",
|
|
"matchCriteriaId": "7D70DDE7-AFD8-4E96-B124-D8C74A713D24"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:puppet:puppetlabs-apache:0.4.0:*:*:*:*:puppet:*:*",
|
|
"matchCriteriaId": "C3246101-B815-433E-8818-69DDCBF231DB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:puppet:puppetlabs-apache:0.6.0:*:*:*:*:puppet:*:*",
|
|
"matchCriteriaId": "96DC25A5-20DA-4AAB-AFE8-E0F8860410CB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:puppet:puppetlabs-apache:0.7.0:*:*:*:*:puppet:*:*",
|
|
"matchCriteriaId": "024EAA12-121C-4C5D-AEA0-1006A9EEC1C0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:puppet:puppetlabs-apache:0.8.0:*:*:*:*:puppet:*:*",
|
|
"matchCriteriaId": "2D2DA386-58F8-42FF-AB23-87260D459CAE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:puppet:puppetlabs-apache:0.8.1:*:*:*:*:puppet:*:*",
|
|
"matchCriteriaId": "0179AF2F-6F74-4A78-978D-12A981792F71"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:puppet:puppetlabs-apache:0.9.0:*:*:*:*:puppet:*:*",
|
|
"matchCriteriaId": "D964B3B4-497E-45EF-802A-79ACEB7872C1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:puppet:puppetlabs-apache:0.10.0:*:*:*:*:puppet:*:*",
|
|
"matchCriteriaId": "52A890BA-C4EA-4F72-9937-66F96C3B8480"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:puppet:puppetlabs-apache:0.11.0:*:*:*:*:puppet:*:*",
|
|
"matchCriteriaId": "D2BA6D0F-E9D5-4769-994C-BDA113D4B1A2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:puppet:puppetlabs-apache:1.0.0:*:*:*:*:puppet:*:*",
|
|
"matchCriteriaId": "E2429B70-9CDE-430C-9324-01EE6928299F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:puppet:puppetlabs-apache:1.0.1:*:*:*:*:puppet:*:*",
|
|
"matchCriteriaId": "7CBA3B25-D5A3-424C-B69A-6CCCF10F395F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:puppet:puppetlabs-apache:1.1.0:*:*:*:*:puppet:*:*",
|
|
"matchCriteriaId": "2C73644F-80EF-40FD-BE15-3ACB9DC829CE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:puppet:puppetlabs-apache:1.1.1:*:*:*:*:puppet:*:*",
|
|
"matchCriteriaId": "C414F85A-5D3A-46A1-994F-2BE4C1210640"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:puppet:puppetlabs-apache:1.2.0:*:*:*:*:puppet:*:*",
|
|
"matchCriteriaId": "6F26D4FE-B16F-4619-AD16-043CF29EADBE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:puppet:puppetlabs-apache:1.3.0:*:*:*:*:puppet:*:*",
|
|
"matchCriteriaId": "C606B26F-9844-4F3C-ACAB-EEB518A2D76B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:puppet:puppetlabs-apache:1.4.0:*:*:*:*:puppet:*:*",
|
|
"matchCriteriaId": "14EBC0AA-06E2-49C1-AE46-CB5F672B5A1C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:puppet:puppetlabs-apache:1.4.1:*:*:*:*:puppet:*:*",
|
|
"matchCriteriaId": "3010C01A-82B8-444B-801D-A8D515D6EC21"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:puppet:puppetlabs-apache:1.5.0:*:*:*:*:puppet:*:*",
|
|
"matchCriteriaId": "59EAC010-B84C-4ED6-AEC7-CD70D89AC859"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:puppet:puppetlabs-apache:1.6.0:*:*:*:*:puppet:*:*",
|
|
"matchCriteriaId": "8EF8205F-4624-4CEF-8935-3C868FC9FFBB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:puppet:puppetlabs-apache:1.7.0:*:*:*:*:puppet:*:*",
|
|
"matchCriteriaId": "0FB55AE5-E67D-4697-A139-4425D5E953DF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:puppet:puppetlabs-apache:1.7.1:*:*:*:*:puppet:*:*",
|
|
"matchCriteriaId": "BA3DD4BB-F2BE-4134-A7C3-C5F649BB5374"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:puppet:puppetlabs-apache:1.8.0:*:*:*:*:puppet:*:*",
|
|
"matchCriteriaId": "693B5119-047D-4EFB-9FA3-D1CC96A8445D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:puppet:puppetlabs-apache:1.8.1:*:*:*:*:puppet:*:*",
|
|
"matchCriteriaId": "8ED815B1-53DF-407C-8FA2-D1002B3040E6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:puppet:puppetlabs-apache:1.10.0:*:*:*:*:puppet:*:*",
|
|
"matchCriteriaId": "097F64B5-6019-4AE0-8F7E-F986E30619DE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:puppet:puppetlabs-apache:1.11.0:*:*:*:*:puppet:*:*",
|
|
"matchCriteriaId": "A40BABAF-51B6-4B45-9E5F-F2BC14BB4D16"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:puppet:puppetlabs-apache:2.0.0:*:*:*:*:puppet:*:*",
|
|
"matchCriteriaId": "34E0E71D-3CD8-473C-9B31-98049634B43B"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/100859",
|
|
"source": "security@puppet.com",
|
|
"tags": [
|
|
"Third Party Advisory",
|
|
"VDB Entry"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://puppet.com/security/cve/CVE-2017-2299",
|
|
"source": "security@puppet.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |