Lucene search

K
rubygemsRubySecRUBY:PUPPET-2013-3567
HistoryOct 23, 2017 - 9:00 p.m.

Unauthenticated Remote Code Execution Vulnerability

2017-10-2321:00:00
RubySec
rubysec.com
5

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

Puppet 2.7.x before 2.7.22 and 3.2.x before 3.2.2, and Puppet
Enterprise before 2.8.2, deserializes untrusted YAML, which allows
remote attackers to instantiate arbitrary Ruby classes and execute
arbitrary code via a crafted REST API call.

Affected configurations

Vulners
Node
rubypuppetRange2.7.212.8.0
OR
rubypuppetRange<3.2.2
VendorProductVersionCPE
rubypuppet*cpe:2.3:a:ruby:puppet:*:*:*:*:*:*:*:*

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P