Puppet 2.7.x before 2.7.21 and 3.1.x before 3.1.1, when running Ruby 1.9.3 or later, allows remote attackers to execute arbitrary code via vectors related to "serialized attributes."
Subscriptions
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-2643-1 | puppet security update |
EUVD |
EUVD-2017-0168 | Puppet 2.7.x before 2.7.21 and 3.1.x before 3.1.1, when running Ruby 1.9.3 or later, allows remote attackers to execute arbitrary code via vectors related to "serialized attributes." |
Github GHSA |
GHSA-574q-fxfj-wv6h | Puppet Improper Input Validation vulnerability |
Ubuntu USN |
USN-1759-1 | Puppet vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T15:13:31.295Z
Reserved: 2013-02-11T00:00:00.000Z
Link: CVE-2013-1655
No data.
Status : Deferred
Published: 2013-03-20T16:55:01.807
Modified: 2025-04-11T00:51:21.963
Link: CVE-2013-1655
No data.
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Github GHSA
Ubuntu USN