Vulnerabilities analysis 31Dec2015 (Puppet Vulnerability)

Security annoucements of interest to the AtomiCorp community, such as vulnerabilities in third party applications.
User avatar
mikeshinn
Atomicorp Staff - Site Admin
Atomicorp Staff - Site Admin
Posts: 4149
Joined: Thu Feb 07, 2008 7:49 pm
Location: Chantilly, VA

Vulnerabilities analysis 31Dec2015 (Puppet Vulnerability)

Unread post by mikeshinn »

This report is an analysis of all published vulnerabilities in any product, weaknesses in technologies and exploits Internet wide, and how our products protect our customers from these vulnerabilities, weaknesses and exploits.

Please see this forum post for an explanation of the categories used in this report

ASL users

Summary: If you are using Puppet Enterprise, ensure you have a firewall rule in place to prevent non-whitelisted hosts from accessing Puppet, or install patch from vendor.

Already protect against/Known Method/No update required

CVE-2015-7791 (Multiple SQL injection vulnerabilities in admin.php in the Collne Welcart plugin before 1.5.3 for WordPress)
KODExplorer Web File Manager Cross Site Request Forgery
Simple Ads Manager 2.9.4.116 SQL Injection

Not already protected against/New Method/Update Available

None.

Not already protected against/Doesnt protect against/Solution

None.

Potential Vulnerability/Solution

CVE-2015-7330 Non-whitelisted hosts could access Puppet communications protocol see https://puppetlabs.com/security/cve/cve-2015-7330 for vendor update, or implement firewall rule in ASL to restrict access to Puppet to only whitelisted IPs.

Rules only users

Summary: If you are using Puppet Enterprise, install patch from vendor.

Already protect against/Known Method/No update required

CVE-2015-7791 (Multiple SQL injection vulnerabilities in admin.php in the Collne Welcart plugin before 1.5.3 for WordPress)
KODExplorer Web File Manager Cross Site Request Forgery
Simple Ads Manager 2.9.4.116 SQL Injection

Not already protected against/New Method/Update Available

None.

Not already protected against/Doesnt protect against/Solution

CVE-2015-7330 Non-whitelisted hosts could access Puppet communications protocol, see https://puppetlabs.com/security/cve/cve-2015-7330 for vendor update

Potential Vulnerability/Solution

None.
Post Reply