CVE-2013-3567
19.08.2013, 23:55
Puppet 2.7.x before 2.7.22 and 3.2.x before 3.2.2, and Puppet Enterprise before 2.8.2, deserializes untrusted YAML, which allows remote attackers to instantiate arbitrary Ruby classes and execute arbitrary code via a crafted REST API call.Enginsight
Vendor | Product | Version |
---|---|---|
puppet | puppet | 2.7.2 |
puppet | puppet | 2.7.10 |
puppet | puppet | 2.7.11 |
puppet | puppet | 2.7.12 |
puppet | puppet | 2.7.13 |
puppet | puppet | 2.7.14 |
puppet | puppet | 2.7.16 |
puppet | puppet | 2.7.17 |
puppet | puppet | 2.7.18 |
puppet | puppet | 2.7.21 |
puppet | puppet | 3.2.1 |
puppetlabs | puppet | 2.7.0 |
puppetlabs | puppet | 2.7.1 |
puppetlabs | puppet | 2.7.19 |
puppetlabs | puppet | 2.7.20 |
puppetlabs | puppet | 2.7.20:rc1 |
puppetlabs | puppet | 3.2.0 |
canonical | ubuntu_linux | 12.04 |
canonical | ubuntu_linux | 12.10 |
canonical | ubuntu_linux | 13.04 |
novell | suse_linux_enterprise_desktop | 11.0:sp2 |
novell | suse_linux_enterprise_server | 11.0:sp2 |
novell | suse_linux_enterprise_server | 11.0:sp3 |
novell | suse_linux_enterprise_server | 11.0:sp3 |
puppet | puppet_enterprise | 𝑥 ≤ 2.8.1 |
puppet | puppet_enterprise | 1.0 |
puppet | puppet_enterprise | 1.1 |
puppet | puppet_enterprise | 1.2.0 |
puppet | puppet_enterprise | 2.0.0 |
puppet | puppet_enterprise | 2.5.1 |
puppet | puppet_enterprise | 2.5.2 |
puppet | puppet_enterprise | 2.8.0 |
puppetlabs | puppet | 1.0.0 |
puppetlabs | puppet | 1.1.0 |
puppetlabs | puppet | 1.2.0 |
puppetlabs | puppet | 2.5.0 |
puppetlabs | puppet | 2.6.0 |
puppetlabs | puppet | 2.7.0 |
puppetlabs | puppet | 2.7.1 |
puppetlabs | puppet | 2.7.2 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Common Weakness Enumeration
References