First published: Wed Mar 20 2013(Updated: )
Puppet before 2.6.18, 2.7.x before 2.7.21, and 3.1.x before 3.1.1, and Puppet Enterprise before 1.2.7 and 2.7.x before 2.7.2 allows remote authenticated users with a valid certificate and private key to read arbitrary catalogs or poison the master's cache via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Puppet | <=2.6.17 | |
Puppet | =2.7.2 | |
Puppet | =2.7.3 | |
Puppet | =2.7.4 | |
Puppet | =2.7.5 | |
Puppet | =2.7.6 | |
Puppet | =2.7.7 | |
Puppet | =2.7.8 | |
Puppet | =2.7.9 | |
Puppet | =2.7.10 | |
Puppet | =2.7.11 | |
Puppet | =2.7.12 | |
Puppet | =2.7.13 | |
Puppet | =2.7.14 | |
Puppet | =2.7.16 | |
Puppet | =2.7.17 | |
Puppet | =2.7.18 | |
Puppet | =2.7.0 | |
Puppet | =2.7.1 | |
Puppet | =2.7.19 | |
Puppet | =2.7.20 | |
Puppet | =2.7.20-rc1 | |
Puppet Enterprise | =3.1.0 | |
Puppet | <=1.2.6 | |
Puppet Enterprise | =2.7.0 | |
Puppet Enterprise | =2.7.1 | |
Ubuntu Linux | =11.10 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =12.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-1652 is considered a critical vulnerability due to its potential to allow remote authenticated users to read arbitrary catalogs or poison the master's cache.
To fix CVE-2013-1652, upgrade to Puppet 2.6.18 or higher, Puppet 2.7.21 or higher, or Puppet Enterprise 1.2.7 or higher.
CVE-2013-1652 affects users of Puppet versions prior to 2.6.18, 2.7.x prior to 2.7.21, and 3.1.x prior to 3.1.1.
CVE-2013-1652 allows remote authenticated users with a valid certificate and private key to configure Puppet master behaviors.
There are no known workarounds for CVE-2013-1652; the recommended course of action is to apply the necessary updates.