First published: Fri Mar 14 2014(Updated: )
Multiple cross-site request forgery (CSRF) vulnerabilities in Puppet Enterprise (PE) before 3.0.1 allow remote attackers to hijack the authentication of users for requests that deleting a (1) report, (2) group, or (3) class or possibly have other unspecified impact.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Puppet Enterprise | <=3.0.0 | |
Puppet Enterprise | =1.0 | |
Puppet Enterprise | =1.1 | |
Puppet Enterprise | =1.2.0 | |
Puppet Enterprise | =2.0.0 | |
Puppet Enterprise | =2.0.1 | |
Puppet Enterprise | =2.0.2 | |
Puppet Enterprise | =2.0.3 | |
Puppet Enterprise | =2.5.1 | |
Puppet Enterprise | =2.5.2 | |
Puppet Enterprise | =2.8.0 | |
Puppet Enterprise | =2.8.1 | |
Puppet Enterprise | =2.8.2 | |
Puppet Enterprise | =2.8.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4963 is classified as a moderate severity vulnerability due to its potential to allow unauthorized actions through cross-site request forgery.
To mitigate CVE-2013-4963, you should upgrade Puppet Enterprise to version 3.0.1 or later where the vulnerabilities are resolved.
CVE-2013-4963 allows remote attackers to hijack user authentication for actions such as deleting reports, groups, or classes.
Puppet Enterprise versions prior to 3.0.1, including versions 1.0, 1.1, 1.2.0, 2.0.0 through 2.8.3, are affected by CVE-2013-4963.
Users of Puppet Enterprise versions below 3.0.1 are primarily affected by the vulnerabilities described in CVE-2013-4963.