CVE-2013-3567

Puppet 2.7.x before 2.7.22 and 3.2.x before 3.2.2, and Puppet Enterprise before 2.8.2, deserializes untrusted YAML, which allows remote attackers to instantiate arbitrary Ruby classes and execute arbitrary code via a crafted REST API call.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:puppet:puppet:2.7.2:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.7.10:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.7.11:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.7.12:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.7.13:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.7.14:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.7.16:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.7.17:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.7.18:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.7.21:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:3.2.1:*:*:*:*:*:*:*
cpe:2.3:a:puppetlabs:puppet:2.7.0:*:*:*:*:*:*:*
cpe:2.3:a:puppetlabs:puppet:2.7.1:*:*:*:*:*:*:*
cpe:2.3:a:puppetlabs:puppet:2.7.19:*:*:*:*:*:*:*
cpe:2.3:a:puppetlabs:puppet:2.7.20:*:*:*:*:*:*:*
cpe:2.3:a:puppetlabs:puppet:2.7.20:rc1:*:*:*:*:*:*
cpe:2.3:a:puppetlabs:puppet:3.2.0:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:novell:suse_linux_enterprise_desktop:11:sp3:*:*:*:*:*:*
cpe:2.3:o:novell:suse_linux_enterprise_desktop:11.0:sp2:*:*:*:*:*:*
cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp2:*:*:*:vmware:*:*
cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:*:*:*:*
cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:*:vmware:*:*

Configuration 4 (hide)

OR cpe:2.3:a:puppet:puppet_enterprise:*:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet_enterprise:1.0:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet_enterprise:1.1:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet_enterprise:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet_enterprise:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet_enterprise:2.5.1:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet_enterprise:2.5.2:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet_enterprise:2.8.0:*:*:*:*:*:*:*
cpe:2.3:a:puppetlabs:puppet:1.0.0:-:enterprise:*:*:*:*:*
cpe:2.3:a:puppetlabs:puppet:1.1.0:-:enterprise:*:*:*:*:*
cpe:2.3:a:puppetlabs:puppet:1.2.0:-:enterprise:*:*:*:*:*
cpe:2.3:a:puppetlabs:puppet:2.5.0:-:enterprise:*:*:*:*:*
cpe:2.3:a:puppetlabs:puppet:2.6.0:-:enterprise:*:*:*:*:*
cpe:2.3:a:puppetlabs:puppet:2.7.0:-:enterprise:*:*:*:*:*
cpe:2.3:a:puppetlabs:puppet:2.7.1:-:enterprise:*:*:*:*:*
cpe:2.3:a:puppetlabs:puppet:2.7.2:-:enterprise:*:*:*:*:*

History

21 Nov 2024, 01:53

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00002.html - () http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00002.html -
References () http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00019.html - () http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00019.html -
References () http://rhn.redhat.com/errata/RHSA-2013-1283.html - () http://rhn.redhat.com/errata/RHSA-2013-1283.html -
References () http://rhn.redhat.com/errata/RHSA-2013-1284.html - () http://rhn.redhat.com/errata/RHSA-2013-1284.html -
References () http://secunia.com/advisories/54429 - Vendor Advisory () http://secunia.com/advisories/54429 - Vendor Advisory
References () http://www.debian.org/security/2013/dsa-2715 - () http://www.debian.org/security/2013/dsa-2715 -
References () http://www.ubuntu.com/usn/USN-1886-1 - () http://www.ubuntu.com/usn/USN-1886-1 -
References () https://puppetlabs.com/security/cve/cve-2013-3567/ - Vendor Advisory () https://puppetlabs.com/security/cve/cve-2013-3567/ - Vendor Advisory

Information

Published : 2013-08-19 23:55

Updated : 2024-11-21 01:53


NVD link : CVE-2013-3567

Mitre link : CVE-2013-3567

CVE.ORG link : CVE-2013-3567


JSON object : View

Products Affected

canonical

  • ubuntu_linux

puppet

  • puppet
  • puppet_enterprise

novell

  • suse_linux_enterprise_server
  • suse_linux_enterprise_desktop

puppetlabs

  • puppet
CWE
CWE-20

Improper Input Validation