Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2013-3567

Опубликовано: 19 авг. 2013
Источник: debian
EPSS Средний

Описание

Puppet 2.7.x before 2.7.22 and 3.2.x before 3.2.2, and Puppet Enterprise before 2.8.2, deserializes untrusted YAML, which allows remote attackers to instantiate arbitrary Ruby classes and execute arbitrary code via a crafted REST API call.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
puppetfixed3.2.2-1package

EPSS

Процентиль: 93%
0.11139
Средний

Связанные уязвимости

ubuntu
больше 12 лет назад

Puppet 2.7.x before 2.7.22 and 3.2.x before 3.2.2, and Puppet Enterprise before 2.8.2, deserializes untrusted YAML, which allows remote attackers to instantiate arbitrary Ruby classes and execute arbitrary code via a crafted REST API call.

redhat
больше 12 лет назад

Puppet 2.7.x before 2.7.22 and 3.2.x before 3.2.2, and Puppet Enterprise before 2.8.2, deserializes untrusted YAML, which allows remote attackers to instantiate arbitrary Ruby classes and execute arbitrary code via a crafted REST API call.

nvd
больше 12 лет назад

Puppet 2.7.x before 2.7.22 and 3.2.x before 3.2.2, and Puppet Enterprise before 2.8.2, deserializes untrusted YAML, which allows remote attackers to instantiate arbitrary Ruby classes and execute arbitrary code via a crafted REST API call.

github
больше 8 лет назад

Puppet Improper Input Validation vulnerability

suse-cvrf
больше 11 лет назад

Security update for puppet

EPSS

Процентиль: 93%
0.11139
Средний