Puppet 2.7.x before 2.7.22 and 3.2.x before 3.2.2, and Puppet Enterprise before 2.8.2, deserializes untrusted YAML, which allows remote attackers to instantiate arbitrary Ruby classes and execute arbitrary code via a crafted REST API call.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
No history.
Information
Published : 2013-08-19 23:55
Updated : 2024-02-04 18:16
NVD link : CVE-2013-3567
Mitre link : CVE-2013-3567
CVE.ORG link : CVE-2013-3567
JSON object : View
Products Affected
puppetlabs
- puppet
canonical
- ubuntu_linux
novell
- suse_linux_enterprise_server
- suse_linux_enterprise_desktop
puppet
- puppet_enterprise
- puppet
CWE
CWE-20
Improper Input Validation