[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2013-219 ---- puppet

ID: oval:org.secpod.oval:def:1600289Date: (C)2016-05-19   (M)2022-10-10
Class: PATCHFamily: unix




Unspecified vulnerability in Puppet 2.7.x before 2.7.23 and 3.2.x before 3.2.4, and Puppet Enterprise 2.8.x before 2.8.3 and 3.0.x before 3.0.1, allows remote attackers to execute arbitrary Ruby programs from the master via the resource_type service. NOTE: this vulnerability can only be exploited utilizing unspecified "local file system access" to the Puppet Master. Puppet Module Tool , as used in Puppet 2.7.x before 2.7.23 and 3.2.x before 3.2.4, and Puppet Enterprise 2.8.x before 2.8.3 and 3.0.x before 3.0.1, installs modules with weak permissions if those permissions were used when the modules were originally built, which might allow local users to read or modify those modules depending on the original permissions.

Platform:
Amazon Linux AMI
Product:
puppet
Reference:
ALAS-2013-219
CVE-2013-4761
CVE-2013-4956
CVE    2
CVE-2013-4761
CVE-2013-4956
CPE    30
cpe:/o:amazon:linux
cpe:/a:puppetlabs:puppet:2.7.21
cpe:/a:puppetlabs:puppet:2.7.22
cpe:/a:puppetlabs:puppet:2.8.1:-:enterprise
...

© SecPod Technologies