First published: Fri Oct 25 2013(Updated: )
The dashboard report in Puppet Enterprise before 3.0.1 allows attackers to execute arbitrary YAML code via a crafted report-specific type.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Puppet Enterprise | <=3.0.0 | |
Puppet Enterprise | =2.5.1 | |
Puppet Enterprise | =2.5.2 | |
Puppet Enterprise | =2.8.0 | |
Puppet Enterprise | =2.8.1 | |
Puppet Enterprise | =2.8.2 | |
Puppet Enterprise | =2.8.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4957 is classified as a high severity vulnerability due to the potential for attackers to execute arbitrary code.
To fix CVE-2013-4957, upgrade to Puppet Enterprise version 3.0.1 or later.
CVE-2013-4957 can facilitate arbitrary code execution due to inadequate input validation in the dashboard report.
Puppet Enterprise versions prior to 3.0.1 and specifically 2.5.1, 2.5.2, 2.8.0, 2.8.1, 2.8.2, and 2.8.3 are affected by CVE-2013-4957.
Yes, CVE-2013-4957 is exploitable remotely, allowing unauthorized users to execute malicious code.