Lucene search

K
amazonAmazonALAS-2013-213
HistoryJul 12, 2013 - 3:57 p.m.

Critical: puppet

2013-07-1215:57:00
alas.aws.amazon.com
18

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.223 Low

EPSS

Percentile

96.5%

Issue Overview:

Puppet 2.7.x before 2.7.22 and 3.2.x before 3.2.2, and Puppet Enterprise before 2.8.2, deserializes untrusted YAML, which allows remote attackers to instantiate arbitrary Ruby classes and execute arbitrary code via a crafted REST API call.

Affected Packages:

puppet

Issue Correction:
Run yum update puppet to update your system.

New Packages:

i686:  
    puppet-debuginfo-2.7.22-1.0.amzn1.i686  
    puppet-2.7.22-1.0.amzn1.i686  
    puppet-server-2.7.22-1.0.amzn1.i686  
  
src:  
    puppet-2.7.22-1.0.amzn1.src  
  
x86_64:  
    puppet-2.7.22-1.0.amzn1.x86_64  
    puppet-debuginfo-2.7.22-1.0.amzn1.x86_64  
    puppet-server-2.7.22-1.0.amzn1.x86_64  

Additional References

Red Hat: CVE-2013-3567

Mitre: CVE-2013-3567

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.223 Low

EPSS

Percentile

96.5%