Puppet 2.7.x before 2.7.22 and 3.2.x before 3.2.2, and Puppet Enterprise before 2.8.2, deserializes untrusted YAML, which allows remote attackers to instantiate arbitrary Ruby classes and execute arbitrary code via a crafted REST API call.

Project Subscriptions

Vendors Products
Canonical Subscribe
Ubuntu Linux Subscribe
Suse Linux Enterprise Desktop Subscribe
Suse Linux Enterprise Server Subscribe
Puppet Enterprise Subscribe
Puppetlabs Subscribe
Openstack Subscribe
Advisories
Source ID Title
Debian DSA Debian DSA DSA-2715-1 puppet security update
Github GHSA Github GHSA GHSA-f7p5-w2cr-7cp7 Puppet Improper Input Validation vulnerability
Ubuntu USN Ubuntu USN USN-1886-1 Puppet vulnerability
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-06T16:14:56.276Z

Reserved: 2013-05-21T00:00:00

Link: CVE-2013-3567

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2013-08-19T23:55:08.523

Modified: 2025-04-11T00:51:21.963

Link: CVE-2013-3567

cve-icon Redhat

Severity : Critical

Publid Date: 2013-06-18T00:00:00Z

Links: CVE-2013-3567 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses