First published: Tue Aug 20 2013(Updated: )
Puppet Enterprise before 3.0.1 uses HTTP responses that contain sensitive information without the "no-cache" setting, which might allow local users to obtain sensitive information such as (1) host name, (2) MAC address, and (3) SSH keys via the web browser cache.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Puppet Enterprise | <=3.0.0 | |
Puppet Enterprise | =2.5.1 | |
Puppet Enterprise | =2.5.2 | |
Puppet Enterprise | =2.8.0 | |
Puppet Enterprise | =2.8.1 | |
Puppet Enterprise | =2.8.2 | |
Puppet Enterprise | =2.8.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4959 is regarded as a moderate severity vulnerability due to the potential exposure of sensitive information.
To fix CVE-2013-4959, upgrade Puppet Enterprise to version 3.0.1 or later to implement the necessary security updates.
CVE-2013-4959 could expose sensitive information like host names, MAC addresses, and SSH keys through the web browser cache.
CVE-2013-4959 affects Puppet Enterprise versions before 3.0.1, including specific versions from the 2.x series.
Yes, local users may exploit CVE-2013-4959 due to the absence of the "no-cache" setting in HTTP responses allowing access to sensitive information.