id: CVE-2020-7943 info: name: Puppet Server/PuppetDB - Sensitive Information Disclosure author: c-sh0 severity: high description: Puppet Server and PuppetDB provide useful performance and debugging information via their metrics API endpoints, which may contain sensitive information when left exposed. impact: | An attacker can exploit this vulnerability to gain access to sensitive information stored in Puppet Server/PuppetDB. remediation: | Apply the necessary patches or updates provided by Puppet to fix the vulnerability and ensure sensitive information is properly protected. reference: - https://puppet.com/security/cve/CVE-2020-7943 - https://tickets.puppetlabs.com/browse/PDB-4876 - https://puppet.com/security/cve/CVE-2020-7943/ - https://nvd.nist.gov/vuln/detail/CVE-2020-7943 - https://github.com/ARPSyndicate/cvemon classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2020-7943 cwe-id: CWE-276,NVD-CWE-noinfo epss-score: 0.06791 epss-percentile: 0.93863 cpe: cpe:2.3:a:puppet:puppet_enterprise:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: puppet product: puppet_enterprise tags: cve2020,cve,puppet,exposure,puppetdb http: - method: GET path: - "{{BaseURL}}/metrics/v1/mbeans" matchers-condition: and matchers: - type: word part: body words: - "trapperkeeper" - type: word part: header words: - "application/json" - type: status status: - 200 # digest: 4b0a00483046022100d1666bc4bb4986e4dce6f31b2c1484850d1bc0905ac7ad4b1953b7581b1fe21d022100d616636f1f8420750a310f2dcee88eca1f793859493d8ebd0a3bb2062c64b495:922c64590222798bb761d5b6d8e72950