Description
A valid, authenticated user with sufficient privileges and who is aware of Continuous Compliance’s internal database configurations can leverage the application’s built-in Connector functionality to access Continuous Compliance’s internal database. This allows the user to explore the internal database schema and export its data, including the properties of Connecters and Rule Sets.
Exploits
No known exploits found for this CVE.
Search Exploit-DBReferences
security@puppet.com
https://portal.perforce.com/s/detail/a91PA000001SeefYAC