CVE-2022-2394

Puppet Bolt prior to version 3.24.0 will print sensitive parameters when planning a run resulting in them potentially being logged when run programmatically, such as via Puppet Enterprise.
References
Link Resource
https://puppet.com/security/cve/CVE-2022-2394 Release Notes Vendor Advisory
https://puppet.com/security/cve/CVE-2022-2394 Release Notes Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:perforce:puppet_bolt:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:00

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 3.5
v2 : unknown
v3 : 4.1
References () https://puppet.com/security/cve/CVE-2022-2394 - Release Notes, Vendor Advisory () https://puppet.com/security/cve/CVE-2022-2394 - Release Notes, Vendor Advisory

30 Jun 2023, 18:54

Type Values Removed Values Added
CWE CWE-200 CWE-532

27 Jul 2022, 18:06

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 3.5
CPE cpe:2.3:a:perforce:puppet_bolt:*:*:*:*:*:*:*:*
CWE CWE-200
References (MISC) https://puppet.com/security/cve/CVE-2022-2394 - (MISC) https://puppet.com/security/cve/CVE-2022-2394 - Release Notes, Vendor Advisory

19 Jul 2022, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-07-19 18:15

Updated : 2024-11-21 07:00


NVD link : CVE-2022-2394

Mitre link : CVE-2022-2394

CVE.ORG link : CVE-2022-2394


JSON object : View

Products Affected

perforce

  • puppet_bolt
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

CWE-532

Insertion of Sensitive Information into Log File