First published: Tue Aug 20 2013(Updated: )
Puppet Enterprise before 3.0.1 allows remote attackers to obtain the database password via vectors related to how the password is "seeded as a console parameter," External Node Classifiers, and the lack of access control for /nodes.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Puppet Enterprise | <=3.0.0 | |
Puppet Enterprise | =2.5.1 | |
Puppet Enterprise | =2.5.2 | |
Puppet Enterprise | =2.8.0 | |
Puppet Enterprise | =2.8.1 | |
Puppet Enterprise | =2.8.2 | |
Puppet Enterprise | =2.8.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4967 has a moderate severity rating due to the potential exposure of sensitive database passwords.
To mitigate CVE-2013-4967, upgrade Puppet Enterprise to version 3.0.1 or later.
CVE-2013-4967 affects Puppet Enterprise versions prior to 3.0.1, including 2.5.1, 2.5.2, 2.8.0, 2.8.1, 2.8.2, and 2.8.3.
The main impact of CVE-2013-4967 is unauthorized access to the database password, which can lead to further exploitation of the system.
Yes, CVE-2013-4967 is a remote vulnerability that allows attackers to exploit the system without physical access.