CVE-2013-1653

EUVD-2013-1684
Puppet before 2.6.18, 2.7.x before 2.7.21, and 3.1.x before 3.1.1, and Puppet Enterprise before 1.2.7 and 2.7.x before 2.7.2, when listening for incoming connections is enabled and allowing access to the "run" REST endpoint is allowed, allows remote authenticated users to execute arbitrary code via a crafted HTTP request.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.1 UNKNOWN
NETWORK
HIGH
AV:N/AC:H/Au:S/C:C/I:C/A:C
Base Score
CVSS 3.x
EPSS Score
Percentile: 84%
Affected Products (NVD)
VendorProductVersion
puppetpuppet
2.6.0 ≤
𝑥
≤ 2.6.17
puppetpuppet
2.7.2
puppetpuppet
2.7.3
puppetpuppet
2.7.4
puppetpuppet
2.7.5
puppetpuppet
2.7.6
puppetpuppet
2.7.7
puppetpuppet
2.7.8
puppetpuppet
2.7.9
puppetpuppet
2.7.10
puppetpuppet
2.7.11
puppetpuppet
2.7.12
puppetpuppet
2.7.13
puppetpuppet
2.7.14
puppetpuppet
2.7.16
puppetpuppet
2.7.17
puppetpuppet
2.7.18
puppetlabspuppet
2.7.0
puppetlabspuppet
2.7.1
puppetlabspuppet
2.7.19
puppetlabspuppet
2.7.20
puppetlabspuppet
2.7.20:rc1
puppetpuppet_enterprise
3.1.0
puppetlabspuppet
1.0
puppetlabspuppet
1.1
puppetlabspuppet
1.2.0
puppetlabspuppet
1.2.1
puppetlabspuppet
1.2.2
puppetlabspuppet
1.2.3
puppetlabspuppet
1.2.4
puppetlabspuppet
1.2.5
puppetlabspuppet
1.2.6
puppetpuppet_enterprise
2.7.0
puppetpuppet_enterprise
2.7.1
canonicalubuntu_linux
11.10
canonicalubuntu_linux
12.04
canonicalubuntu_linux
12.10
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
puppet
bullseye
5.5.22-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
puppet
hardy
ignored
lucid
not-affected
oneiric
Fixed 2.7.1-1ubuntu3.8
released
precise
Fixed 2.7.11-1ubuntu2.2
released
quantal
Fixed 2.7.18-1ubuntu1.1
released