Vulnerability CVE-2016-5715


Published: 2017-01-12   Modified: 2017-01-13

Description:
Open redirect vulnerability in the Console in Puppet Enterprise 2015.x and 2016.x before 2016.4.0 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a // (slash slash) followed by a domain in the redirect parameter. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6501.

See advisories in our WLB2 database:
Topic
Author
Date
Low
Puppet Enterprise Web Interface Open Redirect
hyp3rlinx
23.10.2016

Type:

CWE-601

(URL Redirection to Untrusted Site ('Open Redirect'))

CVSS2 => (AV:N/AC:M/Au:N/C:P/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5.8/10
4.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
None
Affected software
Puppetlabs -> Puppet 
Puppet -> Puppet 

 References:
http://hyp3rlinx.altervista.org/advisories/PUPPET-AUTHENTICATION-REDIRECT.txt
http://packetstormsecurity.com/files/139302/Puppet-Enterprise-Web-Interface-Open-Redirect.html
http://www.securityfocus.com/archive/1/539618/100/0/threaded
http://www.securityfocus.com/bid/93846
https://puppet.com/security/cve/cve-2016-5715

Copyright 2024, cxsecurity.com

 

Back to Top