CVE-2013-3567: Improper Input Validation
(updated )
Puppet 2.7.x before 2.7.22 and 3.2.x before 3.2.2, and Puppet Enterprise before 2.8.2, deserializes untrusted YAML, which allows remote attackers to instantiate arbitrary Ruby classes and execute arbitrary code via a crafted REST API call.
References
- lists.opensuse.org/opensuse-security-announce/2013-08/msg00002.html
- lists.opensuse.org/opensuse-security-announce/2013-08/msg00019.html
- rhn.redhat.com/errata/RHSA-2013-1283.html
- rhn.redhat.com/errata/RHSA-2013-1284.html
- secunia.com/advisories/54429
- www.debian.org/security/2013/dsa-2715
- www.ubuntu.com/usn/USN-1886-1
- github.com/advisories/GHSA-f7p5-w2cr-7cp7
- nvd.nist.gov/vuln/detail/CVE-2013-3567
- puppetlabs.com/security/cve/cve-2013-3567/
Detect and mitigate CVE-2013-3567 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →