CVE-2021-27023: Unsafe HTTP Redirect in Puppet Agent and Puppet Server
6.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.49357%
CWE
-
Published
12/2/2021
Updated
5/4/2023
KEV Status
No
Technology
Ruby
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
puppet | rubygems | >= 7.0.0, < 7.12.1 | 7.12.1 |
puppet | rubygems | < 6.25.1 | 6.25.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability description indicates unsafe handling of HTTP
redirects similar to CVE-2018-1000007
, which involved leaking credentials via redirects. Puppet's HTTP
client would have needed a method to handle redirects, and the patched versions (6.25.1/7.12.1) likely added host validation and header stripping in this redirect handling logic. The function name and path are inferred from Puppet's code structure and Ruby HTTP
client patterns, though exact implementation details are unavailable.