CVE-2016-2785

high-risk
Published 2016-06-10

Puppet Server before 2.3.2 and Ruby puppetmaster in Puppet 4.x before 4.4.2 and in Puppet Agent before 1.4.2 might allow remote attackers to bypass intended auth.conf access restrictions by leveraging incorrect URL decoding.

Do I need to act?

-
0.17% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10 Critical
NETWORK / LOW complexity

Affected Products (20)

Puppet
Puppet
Puppet
Puppet
Puppet
Puppet
Puppet
Puppet
Puppet
Puppet Server
Puppet Server
Puppet
Puppet
Puppet
Puppet
Puppet
Puppet Server
Puppet Server
Puppet Server
Puppet Server

Affected Vendors

53
/ 100
high-risk
Severity 32/34 · Critical
Exploitability 1/34 · Minimal
Exposure 20/34 · Moderate