Loading HuntDB...

GHSA-gqvf-892r-vjm5

GitHub Security Advisory

Improper Certificate Validation in Puppet

✓ GitHub Reviewed MODERATE Has CVE

Advisory Details

Previously, Puppet operated on the model that a node with a valid certificate was entitled to all information in the system and that a compromised certificate allowed access to everything in the infrastructure. When a node's catalog falls back to the `default` node, the catalog can be retrieved for a different node by modifying facts for the Puppet run. This issue can be mitigated by setting `strict_hostname_checking = true` in `puppet.conf` on your Puppet master. Puppet 6.13.0 changes the default behavior for strict_hostname_checking from false to true. It is recommended that Puppet Open Source and Puppet Enterprise users that are not upgrading still set strict_hostname_checking to true to ensure secure behavior.

Affected Packages

RubyGems puppet
Affected versions: 6.0.0 (fixed in 6.13.0)
RubyGems puppet
Affected versions: 0 (fixed in 5.5.19)

Related CVEs

Key Information

GHSA ID
GHSA-gqvf-892r-vjm5
Published
April 13, 2021 3:42 PM
Last Modified
July 5, 2023 7:26 PM
CVSS Score
5.0 /10
Primary Ecosystem
RubyGems
Primary Package
puppet
GitHub Reviewed
✓ Yes

Dataset

Last updated: September 11, 2025 6:35 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.