Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1331024 - (CVE-2016-2785) CVE-2016-2785 puppet: incorrect URL decoding
CVE-2016-2785 puppet: incorrect URL decoding
Status: CLOSED NOTABUG
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
impact=low,public=20160426,reported=2...
: Security
Depends On: 1331025 1331026 1331027
Blocks: 1331028
  Show dependency treegraph
 
Reported: 2016-04-27 09:18 EDT by Martin Prpič
Modified: 2016-06-06 21:03 EDT (History)
45 users (show)

See Also:
Fixed In Version: Puppet Server 2.3.2, Puppet Agent 1.4.2, Puppet 4.4.2
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2016-06-06 21:03:38 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Martin Prpič 2016-04-27 09:18:40 EDT
The following flaw was found in Puppet:

Puppet Server 2.x and Ruby Puppet Master from Puppet 4.x did not correctly decode specific character combinations which could potentially allow for a host to access endpoints restricted by auth.conf rules.

This issue is fixed in Puppet Server 2.3.2, Puppet 4.4.2, and Puppet Agent 1.4.2.

External References:

https://puppet.com/security/cve/cve-2016-2785
Comment 2 Martin Prpič 2016-04-27 09:20:22 EDT
Created puppet tracking bugs for this issue:

Affects: fedora-all [bug 1331025]
Affects: epel-all [bug 1331026]
Comment 6 Kurt Seifried 2016-06-06 21:03:38 EDT
Statement:

This issue did not affect the versions of Puppet as shipped with various Red Hat products as they did not include support Puppet 3.x (using Passenger 4.x).

Note You need to log in before you can comment on or make changes to this bug.