Remote code-execution vulnerability in Puppet via a crafted request for a reportID: oval:org.secpod.oval:def:10649 | Date: (C)2013-04-08 (M)2022-01-24 |
Class: VULNERABILITY | Family: macos |
The host is installed with Puppet 2.6.x before 2.6.18 and is prone to remote code-execution vulnerability. A flaw is present in the applications, which fail to handle a crafted request for a report. Successful exploitation allows remote authenticated users to execute arbitrary code on the puppet master, or an agent with puppet kick enabled.
Platform: |
Apple Mac OS X 10.8 |
Apple Mac OS X 10.9 |
Apple Mac OS X 10.10 |
Apple Mac OS X Server 10.8 |
Apple Mac OS X Server 10.9 |
Apple Mac OS X Server 10.10 |