logo

CVE-2013-3567 puppet

Package

Manager: gem
Name: puppet
Vulnerable Version: >=2.7.0 <2.7.22 || >=3.2.0 <3.2.2

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.11139 pctl0.93213

Details

Puppet Improper Input Validation vulnerability Puppet 2.7.x before 2.7.22 and 3.2.x before 3.2.2, and Puppet Enterprise before 2.8.2, deserializes untrusted YAML, which allows remote attackers to instantiate arbitrary Ruby classes and execute arbitrary code via a crafted REST API call.

Metadata

Created: 2017-10-24T18:33:37Z
Modified: 2023-05-12T17:27:38Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2017/10/GHSA-f7p5-w2cr-7cp7/GHSA-f7p5-w2cr-7cp7.json
CWE IDs: ["CWE-20"]
Alternative ID: GHSA-f7p5-w2cr-7cp7
Finding: F184
Auto approve: 1