7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.223 Low
EPSS
Percentile
96.5%
Puppet 2.7.x before 2.7.22 and 3.2.x before 3.2.2, and Puppet Enterprise before 2.8.2, deserializes untrusted YAML, which allows remote attackers to instantiate arbitrary Ruby classes and execute arbitrary code via a crafted REST API call.
lists.opensuse.org/opensuse-security-announce/2013-08/msg00002.html
lists.opensuse.org/opensuse-security-announce/2013-08/msg00019.html
rhn.redhat.com/errata/RHSA-2013-1283.html
rhn.redhat.com/errata/RHSA-2013-1284.html
www.debian.org/security/2013/dsa-2715
www.ubuntu.com/usn/USN-1886-1
github.com/advisories/GHSA-f7p5-w2cr-7cp7
github.com/rubysec/ruby-advisory-db/blob/master/gems/puppet/CVE-2013-3567.yml
nvd.nist.gov/vuln/detail/CVE-2013-3567
puppetlabs.com/security/cve/cve-2013-3567/
www.puppet.com/security/cve/cve-2013-3567-unauthenticated-remote-code-execution-vulnerability