First published: Tue Aug 20 2013(Updated: )
Puppet Enterprise before 3.0.1 does not sufficiently invalidate a session when a user logs out, which might allow remote attackers to hijack sessions by obtaining an old session ID.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Puppetlabs Puppet Enterprise | <=3.0.0 | |
Puppetlabs Puppet Enterprise | =2.5.1 | |
Puppetlabs Puppet Enterprise | =2.5.2 | |
Puppetlabs Puppet Enterprise | =2.8.0 | |
Puppetlabs Puppet Enterprise | =2.8.1 | |
Puppetlabs Puppet Enterprise | =2.8.2 | |
Puppetlabs Puppet Enterprise | =2.8.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4762 is classified as a high-severity vulnerability due to the potential for session hijacking.
To fix CVE-2013-4762, users should upgrade Puppet Enterprise to version 3.0.1 or later.
CVE-2013-4762 can result in session hijacking, allowing attackers to impersonate legitimate users.
CVE-2013-4762 affects all versions of Puppet Enterprise prior to 3.0.1.
Yes, CVE-2013-4762 can be exploited remotely by an attacker who can obtain an old session ID.