CVE-2021-27023
📋 TL;DR
This vulnerability in Puppet Agent and Puppet Server allows HTTP credentials to be leaked when following redirects to different hosts. Attackers could intercept authentication tokens or credentials during HTTP communication. All systems running vulnerable versions of Puppet software are affected.
💻 Affected Systems
- Puppet Agent
- Puppet Server
📦 What is this software?
Fedora by Fedoraproject
⚠️ Risk & Real-World Impact
Worst Case
Attackers gain administrative access to Puppet infrastructure, potentially compromising all managed nodes and enabling lateral movement across the network.
Likely Case
Credential theft leading to unauthorized access to Puppet-managed systems, configuration manipulation, or data exfiltration.
If Mitigated
Limited impact with proper network segmentation and credential rotation, though authentication tokens could still be exposed.
🎯 Exploit Status
Exploitation requires ability to intercept or redirect HTTP traffic between Puppet components. Similar to CVE-2018-1000007.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Puppet Agent 6.23.1+, 7.9.1+; Puppet Server 6.13.2+, 7.5.2+
Vendor Advisory: https://puppet.com/security/cve/CVE-2021-27023
Restart Required: Yes
Instructions:
1. Update Puppet Agent to 6.23.1+ or 7.9.1+ 2. Update Puppet Server to 6.13.2+ or 7.5.2+ 3. Restart Puppet services 4. Verify all nodes are reporting correctly
🔧 Temporary Workarounds
Disable HTTP redirects
allConfigure Puppet to not follow HTTP redirects to different hosts
puppet config set follow_redirects false --section agent
Use HTTPS only
allEnforce HTTPS communication between all Puppet components
puppet config set server puppetserver.example.com --section agent
puppet config set ca_server ca.example.com --section agent
🧯 If You Can't Patch
- Implement strict network segmentation to isolate Puppet traffic
- Rotate all Puppet-related credentials and certificates immediately
🔍 How to Verify
Check if Vulnerable:
Check Puppet version: puppet --version and compare against affected ranges
Check Version:
puppet --version
Verify Fix Applied:
Verify version is 6.23.1+ or 7.9.1+ for Agent, 6.13.2+ or 7.5.2+ for Server
📡 Detection & Monitoring
Log Indicators:
- Unusual redirect patterns in Puppet Server logs
- Authentication failures from unexpected sources
Network Indicators:
- HTTP traffic to unexpected destinations from Puppet agents
- Redirect chains involving multiple hosts
SIEM Query:
source="puppet" AND (http_redirect OR status=3*)
🔗 References
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62SELE7EKVKZL4GABFMVYMIIUZ7FPEF7/
- https://puppet.com/security/cve/CVE-2021-27023
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62SELE7EKVKZL4GABFMVYMIIUZ7FPEF7/
- https://puppet.com/security/cve/CVE-2021-27023