Lucene search

K
freebsdFreeBSDB162B218-C547-4BA2-AE31-6FDCB61BC763
HistoryJun 13, 2013 - 12:00 a.m.

puppet -- Unauthenticated Remote Code Execution Vulnerability

2013-06-1300:00:00
vuxml.freebsd.org
26

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.223

Percentile

96.5%

Puppet Developers report:

When making REST api calls, the puppet master takes YAML from an
untrusted client, deserializes it, and then calls methods on the
resulting object. A YAML payload can be crafted to cause the
deserialization to construct an instance of any class available in
the ruby process, which allows an attacker to execute code
contained in the payload.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchpuppet= 2.7UNKNOWN
FreeBSDanynoarchpuppet< 2.7.22UNKNOWN

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.223

Percentile

96.5%