First published: Mon Aug 19 2013(Updated: )
Puppet 2.7.x before 2.7.22 and 3.2.x before 3.2.2, and Puppet Enterprise before 2.8.2, deserializes untrusted YAML, which allows remote attackers to instantiate arbitrary Ruby classes and execute arbitrary code via a crafted REST API call.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
rubygems/puppet | >=3.2.0<3.2.2 | 3.2.2 |
rubygems/puppet | >=2.7.0<2.7.22 | 2.7.22 |
Puppet Puppet | =2.7.2 | |
Puppet Puppet | =2.7.10 | |
Puppet Puppet | =2.7.11 | |
Puppet Puppet | =2.7.12 | |
Puppet Puppet | =2.7.13 | |
Puppet Puppet | =2.7.14 | |
Puppet Puppet | =2.7.16 | |
Puppet Puppet | =2.7.17 | |
Puppet Puppet | =2.7.18 | |
Puppet Puppet | =2.7.21 | |
Puppet Puppet | =3.2.1 | |
Puppetlabs Puppet | =2.7.0 | |
Puppetlabs Puppet | =2.7.1 | |
Puppetlabs Puppet | =2.7.19 | |
Puppetlabs Puppet | =2.7.20 | |
Puppetlabs Puppet | =2.7.20-rc1 | |
Puppetlabs Puppet | =3.2.0 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =12.10 | |
Canonical Ubuntu Linux | =13.04 | |
Novell Suse Linux Enterprise Desktop | =11-sp3 | |
Novell Suse Linux Enterprise Desktop | =11.0-sp2 | |
Novell Suse Linux Enterprise Server Vmware | =11.0-sp2 | |
Novell Suse Linux Enterprise Server | =11.0-sp3 | |
Novell Suse Linux Enterprise Server Vmware | =11.0-sp3 | |
Puppet Puppet Enterprise | <=2.8.1 | |
Puppet Puppet Enterprise | =1.0 | |
Puppet Puppet Enterprise | =1.1 | |
Puppet Puppet Enterprise | =1.2.0 | |
Puppet Puppet Enterprise | =2.0.0 | |
Puppet Puppet Enterprise | =2.5.1 | |
Puppet Puppet Enterprise | =2.5.2 | |
Puppet Puppet Enterprise | =2.8.0 | |
Puppetlabs Puppet | =1.0.0 | |
Puppetlabs Puppet | =1.1.0 | |
Puppetlabs Puppet | =1.2.0 | |
Puppetlabs Puppet | =2.5.0 | |
Puppetlabs Puppet | =2.6.0 | |
Puppetlabs Puppet | =2.7.0 | |
Puppetlabs Puppet | =2.7.1 | |
Puppetlabs Puppet | =2.7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.