[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

252097

 
 

909

 
 

196747

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2013-1653Date: (C)2013-03-20   (M)2023-12-22


Puppet before 2.6.18, 2.7.x before 2.7.21, and 3.1.x before 3.1.1, and Puppet Enterprise before 1.2.7 and 2.7.x before 2.7.2, when listening for incoming connections is enabled and allowing access to the "run" REST endpoint is allowed, allows remote authenticated users to execute arbitrary code via a crafted HTTP request.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 7.1
Exploit Score: 3.9
Impact Score: 10.0
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: HIGH
Authentication: SINGLE
Confidentiality: COMPLETE
Integrity: COMPLETE
Availability: COMPLETE
  
Reference:
SECUNIA-52596
BID-58446
DSA-2643
SUSE-SU-2013:0618
USN-1759-1
https://puppetlabs.com/security/cve/cve-2013-1653/
openSUSE-SU-2013:0641

CPE    6
cpe:/a:puppet:puppet
cpe:/o:canonical:ubuntu_linux:12.10
cpe:/a:puppetlabs:puppet:2.7.1
cpe:/a:puppetlabs:puppet:2.7.0
...
OVAL    6
oval:org.secpod.oval:def:10651
oval:org.secpod.oval:def:10645
oval:org.secpod.oval:def:104775
oval:org.secpod.oval:def:701210
...

© SecPod Technologies