Lucene search

K
freebsdFreeBSDB162B218-C547-4BA2-AE31-6FDCB61BC763
HistoryJun 13, 2013 - 12:00 a.m.

puppet -- Unauthenticated Remote Code Execution Vulnerability

2013-06-1300:00:00
vuxml.freebsd.org
18

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.223 Low

EPSS

Percentile

96.5%

Puppet Developers report:

When making REST api calls, the puppet master takes YAML from an
untrusted client, deserializes it, and then calls methods on the
resulting object. A YAML payload can be crafted to cause the
deserialization to construct an instance of any class available in
the ruby process, which allows an attacker to execute code
contained in the payload.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchpuppet= 2.7UNKNOWN
FreeBSDanynoarchpuppet< 2.7.22UNKNOWN

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.223 Low

EPSS

Percentile

96.5%