Lucene search

K
rubygemsRubySecRUBY:PUPPET-2013-4761
HistoryOct 23, 2017 - 9:00 p.m.

Puppet `resource_type` Remote Code Execution Vulnerability

2017-10-2321:00:00
RubySec
www.puppet.com
10

CVSS2

5.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

Unspecified vulnerability in Puppet 2.7.x before 2.7.23 and
3.2.x before 3.2.4, and Puppet Enterprise 2.8.x before
2.8.3 and 3.0.x before 3.0.1, allows remote attackers to execute
arbitrary Ruby programs from the master via the resource_type
service.

NOTE: this vulnerability can only be exploited using unspecified
“local file system access” to the Puppet Master.

Affected configurations

Vulners
Node
rubypuppetRange2.7.02.7.23
OR
rubypuppetRange3.2.4
VendorProductVersionCPE
rubypuppet*cpe:2.3:a:ruby:puppet:*:*:*:*:*:*:*:*

CVSS2

5.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P