First published: Wed Mar 20 2013(Updated: )
Puppet 2.6.x before 2.6.18 and Puppet Enterprise 1.2.x before 1.2.7 allows remote authenticated users to execute arbitrary code on the puppet master, or an agent with puppet kick enabled, via a crafted request for a report.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Puppet by Puppet Labs | =2.6.0 | |
Puppet by Puppet Labs | =2.6.1 | |
Puppet by Puppet Labs | =2.6.2 | |
Puppet by Puppet Labs | =2.6.3 | |
Puppet by Puppet Labs | =2.6.4 | |
Puppet by Puppet Labs | =2.6.5 | |
Puppet by Puppet Labs | =2.6.6 | |
Puppet by Puppet Labs | =2.6.7 | |
Puppet by Puppet Labs | =2.6.8 | |
Puppet by Puppet Labs | =2.6.9 | |
Puppet by Puppet Labs | =2.6.10 | |
Puppet by Puppet Labs | =2.6.11 | |
Puppet by Puppet Labs | =2.6.12 | |
Puppet by Puppet Labs | =2.6.13 | |
Puppet by Puppet Labs | =2.6.14 | |
Puppet by Puppet Labs | =2.6.15 | |
Puppet by Puppet Labs | =2.6.16 | |
Puppet by Puppet Labs | =2.6.17 | |
Puppetlabs Puppet Enterprise | =1.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-2274 has a high severity rating due to its potential for remote code execution by authenticated users.
To mitigate CVE-2013-2274, upgrade Puppet to version 2.6.18 or Puppet Enterprise to version 1.2.7 or higher.
CVE-2013-2274 affects Puppet versions 2.6.0 to 2.6.17 and Puppet Enterprise versions 1.2.0 to 1.2.6.
CVE-2013-2274 is categorized as a remote code execution vulnerability.
No, exploitation of CVE-2013-2274 requires authentication, allowing only remote authenticated users to attack.