First published: Wed Apr 10 2013(Updated: )
Puppet Labs Puppet Enterprise before 2.8.0 does not use a "randomized secret" in the CAS client config file (cas_client_config.yml) when upgrading from older 1.2.x or 2.0.x versions, which allows remote attackers to obtain console access via a crafted cookie.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Puppetlabs Puppet Enterprise | <=2.7.2 | |
Puppetlabs Puppet Enterprise | =2.0.0 | |
Puppetlabs Puppet Enterprise | =2.5.1 | |
Puppetlabs Puppet Enterprise | =2.5.2 | |
Puppet by Puppet Labs | =1.0.0 | |
Puppet by Puppet Labs | =1.1.0 | |
Puppet by Puppet Labs | =1.2.0 | |
Puppet by Puppet Labs | =2.5.0 | |
Puppet by Puppet Labs | =2.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-2716 is considered a high severity vulnerability due to its potential to allow unauthorized console access.
To fix CVE-2013-2716, upgrade to Puppet Enterprise version 2.8.0 or later.
CVE-2013-2716 is caused by the lack of a randomized secret in the CAS client configuration when upgrading from older versions.
Puppet Enterprise versions prior to 2.8.0, including 1.2.x, 2.0.x, up to 2.7.2, are affected by CVE-2013-2716.
Yes, CVE-2013-2716 can be exploited remotely by using a crafted cookie to gain console access.