Vulnerability Description
Puppet Enterprise 2015.3.3 and 2016.x before 2016.4.0, and Puppet Agent 1.3.6 through 1.7.0 allow remote attackers to bypass a host whitelist protection mechanism and execute arbitrary code on Puppet nodes via vectors related to command validation, aka "Puppet Execution Protocol (PXP) Command Whitelist Validation Vulnerability."
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Puppet | Puppet Enterprise | 2015.3.3 |
| Puppet | Puppet Agent | >= 1.3.6, <= 1.7.0 |
Related Weaknesses (CWE)
References
- https://bugs.gentoo.org/597684Issue TrackingThird Party Advisory
- https://puppet.com/security/cve/cve-2016-5714Vendor Advisory
- https://puppet.com/security/cve/pxp-agent-oct-2016Issue TrackingVendor Advisory
- https://security.gentoo.org/glsa/201710-12Third Party Advisory
- https://bugs.gentoo.org/597684Issue TrackingThird Party Advisory
- https://puppet.com/security/cve/cve-2016-5714Vendor Advisory
- https://puppet.com/security/cve/pxp-agent-oct-2016Issue TrackingVendor Advisory
- https://security.gentoo.org/glsa/201710-12Third Party Advisory
FAQ
What is CVE-2016-5714?
CVE-2016-5714 is a vulnerability with a CVSS score of 7.2 (HIGH). Puppet Enterprise 2015.3.3 and 2016.x before 2016.4.0, and Puppet Agent 1.3.6 through 1.7.0 allow remote attackers to bypass a host whitelist protection mechanism and execute arbitrary code on Puppet ...
How severe is CVE-2016-5714?
CVE-2016-5714 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-5714?
Check the references section above for vendor advisories and patch information. Affected products include: Puppet Puppet Enterprise, Puppet Puppet Agent.