Improper Certificate Validation in Puppet
Moderate severity
GitHub Reviewed
Published
Apr 13, 2021
to the GitHub Advisory Database
•
Updated Jul 5, 2023
Package
Affected versions
>= 6.0.0, < 6.13.0
< 5.5.19
Patched versions
6.13.0
5.5.19
Description
Published by the National Vulnerability Database
Feb 19, 2020
Reviewed
Apr 7, 2021
Published to the GitHub Advisory Database
Apr 13, 2021
Last updated
Jul 5, 2023
Previously, Puppet operated on the model that a node with a valid certificate was entitled to all information in the system and that a compromised certificate allowed access to everything in the infrastructure. When a node's catalog falls back to the
default
node, the catalog can be retrieved for a different node by modifying facts for the Puppet run. This issue can be mitigated by settingstrict_hostname_checking = true
inpuppet.conf
on your Puppet master. Puppet 6.13.0 changes the default behavior for strict_hostname_checking from false to true. It is recommended that Puppet Open Source and Puppet Enterprise users that are not upgrading still set strict_hostname_checking to true to ensure secure behavior.References