{"id":"CVE-2016-9599","details":"puppet-tripleo before versions 5.5.0, 6.2.0 is vulnerable to an access-control flaw in the IPtables rules management, which allowed the creation of TCP/UDP rules with empty port values. If SSL is enabled, a malicious user could use these open ports to gain access to unauthorized resources.","modified":"2026-04-10T03:54:22.538637Z","published":"2018-04-24T01:29:00.223Z","references":[{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2017-0025.html"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9599"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/openstack/puppet-tripleo","events":[{"introduced":"0"},{"last_affected":"3be9575fb091582ec0666d57efc7e8158ae7c17e"},{"introduced":"0"},{"last_affected":"9ad8e263f7c6ef5304b4e8229e93c1d8add38596"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"5.5.0"},{"introduced":"0"},{"last_affected":"6.2.0"}]}}],"versions":["1.0.0","5.0.0.0b1","5.0.0.0b2","5.1.0","5.2.0","5.3.0","5.4.0","5.5.0","6.0.0","6.1.0","6.2.0","kilo-eol"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"10"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-9599.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}