CVE-2020-7942
Severity CVSS v4.0:
Pending analysis
Type:
CWE-295
Improper Certificate Validation
Publication date:
19/02/2020
Last modified:
30/12/2021
Description
Previously, Puppet operated on a model that a node with a valid certificate was entitled to all information in the system and that a compromised certificate allowed access to everything in the infrastructure. When a node's catalog falls back to the `default` node, the catalog can be retrieved for a different node by modifying facts for the Puppet run. This issue can be mitigated by setting `strict_hostname_checking = true` in `puppet.conf` on your Puppet master. Puppet 6.13.0 and 5.5.19 changes the default behavior for strict_hostname_checking from false to true. It is recommended that Puppet Open Source and Puppet Enterprise users that are not upgrading still set strict_hostname_checking to true to ensure secure behavior. Affected software versions: Puppet 6.x prior to 6.13.0 Puppet Agent 6.x prior to 6.13.0 Puppet 5.5.x prior to 5.5.19 Puppet Agent 5.5.x prior to 5.5.19 Resolved in: Puppet 6.13.0 Puppet Agent 6.13.0 Puppet 5.5.19 Puppet Agent 5.5.19
Impact
Base Score 3.x
6.50
Severity 3.x
MEDIUM
Base Score 2.0
4.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:puppet:puppet:*:*:*:*:*:*:*:* | 5.5.0 (including) | 5.5.19 (excluding) |
| cpe:2.3:a:puppet:puppet:*:*:*:*:*:*:*:* | 6.0.0 (including) | 6.13.0 (excluding) |
| cpe:2.3:a:puppet:puppet_agent:*:*:*:*:*:*:*:* | 5.5.0 (including) | 5.5.19 (excluding) |
| cpe:2.3:a:puppet:puppet_agent:*:*:*:*:*:*:*:* | 6.0.0 (including) | 6.13.0 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



