Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2013-3567

Опубликовано: 18 июн. 2013
Источник: redhat
CVSS2: 7.5

Описание

Puppet 2.7.x before 2.7.22 and 3.2.x before 3.2.2, and Puppet Enterprise before 2.8.2, deserializes untrusted YAML, which allows remote attackers to instantiate arbitrary Ruby classes and execute arbitrary code via a crafted REST API call.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat CloudForms Tools 1puppetWill not fix
Red Hat Enterprise MRG 1puppetUnder investigation
Red Hat OpenStack Platform 2.1puppetWill not fix
Red Hat OpenStack Platform 4puppetAffected
Red Hat Subscription Asset ManagerpuppetAffected
OpenStack 3 for RHEL 6facterFixedRHSA-2013:128324.09.2013
OpenStack 3 for RHEL 6hieraFixedRHSA-2013:128324.09.2013
OpenStack 3 for RHEL 6puppetFixedRHSA-2013:128324.09.2013
OpenStack 3 for RHEL 6ruby-augeasFixedRHSA-2013:128324.09.2013
OpenStack 3 for RHEL 6ruby-shadowFixedRHSA-2013:128324.09.2013

Показывать по

Дополнительная информация

Статус:

Critical
Дефект:
CWE-502
https://bugzilla.redhat.com/show_bug.cgi?id=974649puppet: remote code execution on master from unauthenticated clients

7.5 High

CVSS2

Связанные уязвимости

ubuntu
больше 12 лет назад

Puppet 2.7.x before 2.7.22 and 3.2.x before 3.2.2, and Puppet Enterprise before 2.8.2, deserializes untrusted YAML, which allows remote attackers to instantiate arbitrary Ruby classes and execute arbitrary code via a crafted REST API call.

nvd
больше 12 лет назад

Puppet 2.7.x before 2.7.22 and 3.2.x before 3.2.2, and Puppet Enterprise before 2.8.2, deserializes untrusted YAML, which allows remote attackers to instantiate arbitrary Ruby classes and execute arbitrary code via a crafted REST API call.

debian
больше 12 лет назад

Puppet 2.7.x before 2.7.22 and 3.2.x before 3.2.2, and Puppet Enterpri ...

github
больше 8 лет назад

Puppet Improper Input Validation vulnerability

suse-cvrf
больше 11 лет назад

Security update for puppet

7.5 High

CVSS2