Description
Puppet 2.7.x before 2.7.22 and 3.2.x before 3.2.2, and Puppet Enterprise before 2.8.2, deserializes untrusted YAML, which allows remote attackers to instantiate arbitrary Ruby classes and execute arbitrary code via a crafted REST API call.
Published: 2013-08-19
Score: 7.5 High
EPSS: 6.5% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-2715-1 puppet security update
Github GHSA Github GHSA GHSA-f7p5-w2cr-7cp7 Puppet Improper Input Validation vulnerability
Ubuntu USN Ubuntu USN USN-1886-1 Puppet vulnerability
History

No history.

Subscriptions

Canonical Ubuntu Linux
Novell Suse Linux Enterprise Desktop Suse Linux Enterprise Server
Puppet Puppet Puppet Enterprise
Puppetlabs Puppet
Redhat Openstack
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-06T16:14:56.276Z

Reserved: 2013-05-21T00:00:00.000Z

Link: CVE-2013-3567

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2013-08-19T23:55:08.523

Modified: 2025-04-11T00:51:21.963

Link: CVE-2013-3567

cve-icon Redhat

Severity : Critical

Publid Date: 2013-06-18T00:00:00Z

Links: CVE-2013-3567 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses