CVE-2013-3567

Puppet 2.7.x before 2.7.22 and 3.2.x before 3.2.2, and Puppet Enterprise before 2.8.2, deserializes untrusted YAML, which allows remote attackers to instantiate arbitrary Ruby classes and execute arbitrary code via a crafted REST API call.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:puppet:puppet:2.7.2:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.7.10:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.7.11:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.7.12:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.7.13:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.7.14:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.7.16:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.7.17:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.7.18:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:2.7.21:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:3.2.1:*:*:*:*:*:*:*
cpe:2.3:a:puppetlabs:puppet:2.7.0:*:*:*:*:*:*:*
cpe:2.3:a:puppetlabs:puppet:2.7.1:*:*:*:*:*:*:*
cpe:2.3:a:puppetlabs:puppet:2.7.19:*:*:*:*:*:*:*
cpe:2.3:a:puppetlabs:puppet:2.7.20:*:*:*:*:*:*:*
cpe:2.3:a:puppetlabs:puppet:2.7.20:rc1:*:*:*:*:*:*
cpe:2.3:a:puppetlabs:puppet:3.2.0:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:novell:suse_linux_enterprise_desktop:11:sp3:*:*:*:*:*:*
cpe:2.3:o:novell:suse_linux_enterprise_desktop:11.0:sp2:*:*:*:*:*:*
cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp2:*:*:*:vmware:*:*
cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:*:*:*:*
cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:*:vmware:*:*

Configuration 4 (hide)

OR cpe:2.3:a:puppet:puppet_enterprise:*:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet_enterprise:1.0:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet_enterprise:1.1:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet_enterprise:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet_enterprise:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet_enterprise:2.5.1:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet_enterprise:2.5.2:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet_enterprise:2.8.0:*:*:*:*:*:*:*
cpe:2.3:a:puppetlabs:puppet:1.0.0:-:enterprise:*:*:*:*:*
cpe:2.3:a:puppetlabs:puppet:1.1.0:-:enterprise:*:*:*:*:*
cpe:2.3:a:puppetlabs:puppet:1.2.0:-:enterprise:*:*:*:*:*
cpe:2.3:a:puppetlabs:puppet:2.5.0:-:enterprise:*:*:*:*:*
cpe:2.3:a:puppetlabs:puppet:2.6.0:-:enterprise:*:*:*:*:*
cpe:2.3:a:puppetlabs:puppet:2.7.0:-:enterprise:*:*:*:*:*
cpe:2.3:a:puppetlabs:puppet:2.7.1:-:enterprise:*:*:*:*:*
cpe:2.3:a:puppetlabs:puppet:2.7.2:-:enterprise:*:*:*:*:*

History

No history.

Information

Published : 2013-08-19 23:55

Updated : 2023-12-10 11:16


NVD link : CVE-2013-3567

Mitre link : CVE-2013-3567

CVE.ORG link : CVE-2013-3567


JSON object : View

Products Affected

novell

  • suse_linux_enterprise_desktop
  • suse_linux_enterprise_server

puppetlabs

  • puppet

puppet

  • puppet_enterprise
  • puppet

canonical

  • ubuntu_linux
CWE
CWE-20

Improper Input Validation