First published: Wed Mar 20 2013(Updated: )
Puppet 2.6.x before 2.6.18 and Puppet Enterprise 1.2.x before 1.2.7 allows remote authenticated users to execute arbitrary code on the puppet master, or an agent with puppet kick enabled, via a crafted request for a report.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Puppet Puppet | =2.6.0 | |
Puppet Puppet | =2.6.1 | |
Puppet Puppet | =2.6.2 | |
Puppet Puppet | =2.6.3 | |
Puppet Puppet | =2.6.4 | |
Puppet Puppet | =2.6.5 | |
Puppet Puppet | =2.6.6 | |
Puppet Puppet | =2.6.7 | |
Puppet Puppet | =2.6.8 | |
Puppet Puppet | =2.6.9 | |
Puppet Puppet | =2.6.10 | |
Puppet Puppet | =2.6.11 | |
Puppet Puppet | =2.6.12 | |
Puppet Puppet | =2.6.13 | |
Puppet Puppet | =2.6.14 | |
Puppet Puppet | =2.6.15 | |
Puppet Puppet | =2.6.16 | |
Puppetlabs Puppet | =2.6.17 | |
Puppet Puppet Enterprise | =1.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.