Lucene search

K
nessusThis script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.PUPPET_ENTERPRISE_CVE-2023-1894.NASL
HistoryNov 01, 2023 - 12:00 a.m.

Puppet Enterprise 2021.7.1 / 2023.0 DoS

2023-11-0100:00:00
This script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
3
puppet enterprise
denial of service
redos
certificate validation

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

0.0005 Low

EPSS

Percentile

18.2%

A Regular Expression Denial of Service (ReDoS) issue was discovered inΒ Puppet Server 7.9.2 certificate validation. An issue related to specifically crafted certificate names significantly slowed down server operations.

Note that Nessus has not tested for this issue but has instead relied only on the application’s self-reported version number.

#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
#
# The descriptive text in this plugin were  
# extracted from the PuppetLabs Security Advisory page. The text
# itself is copyright (C)  Perforce Software, Inc.
##

include('compat.inc');

if (description)
{
  script_id(184140);
  script_version("1.1");
  script_set_attribute(attribute:"plugin_modification_date", value:"2023/11/02");

  script_cve_id("CVE-2023-1894", "CVE-2023-1894");

  script_name(english:"Puppet Enterprise 2021.7.1 / 2023.0 DoS");

  script_set_attribute(attribute:"synopsis", value:
"An instance of Puppet Enterprise installed on the remote system is affected by a denial of service vulnerability.");
  script_set_attribute(attribute:"description", value:
"A Regular Expression Denial of Service (ReDoS) issue was discovered in Puppet Server 7.9.2 certificate 
validation. An issue related to specifically crafted certificate names significantly slowed down 
server operations.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.");
  script_set_attribute(attribute:"see_also", value:"https://www.puppet.com/security/cve/cve-2023-1894-puppet-server-redos");
  script_set_attribute(attribute:"solution", value:
"Upgrade to Puppet Enterprise version 2021.7.3, 2023.1, or later.");
  script_set_attribute(attribute:"agent", value:"unix");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2023-1894");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2023/05/02");
  script_set_attribute(attribute:"patch_publication_date", value:"2023/05/02");
  script_set_attribute(attribute:"plugin_publication_date", value:"2023/11/01");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:puppetlabs:puppet_enterprise");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Misc.");

  script_copyright(english:"This script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("puppet_enterprise_nix_installed.nbin");
  script_require_keys("installed_sw/puppet_enterprise_console");

  exit(0);
}

include('vcf.inc');

var app_info = vcf::get_app_info(app:'puppet_enterprise_console');

var constraintList = [
  { 'equal': '2021.7.1', 'fixed_version':'2021.7.3' },
  { 'equal':'2023.0', 'fixed_version':'2023.1' }
];

vcf::check_version_and_report(app_info:app_info, constraints:constraintList, severity:SECURITY_WARNING);
VendorProductVersionCPE
puppetlabspuppet_enterprisecpe:/a:puppetlabs:puppet_enterprise

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

0.0005 Low

EPSS

Percentile

18.2%