Puppet CVE-2013-2274 Remote Code Execution Vulnerability
BID:58447
Info
Puppet CVE-2013-2274 Remote Code Execution Vulnerability
| Bugtraq ID: | 58447 |
| Class: | Unknown |
| CVE: |
CVE-2013-2274 |
| Remote: | Yes |
| Local: | No |
| Published: | Mar 09 2013 12:00AM |
| Updated: | Mar 19 2015 08:46AM |
| Credit: | Puppet Labs |
| Vulnerable: |
SuSE SUSE Linux Enterprise Server for VMware 11 SP2 SuSE SUSE Linux Enterprise Server 11 SP2 SuSE SUSE Linux Enterprise Desktop 11 SP2 Puppet Labs Puppet Enterprise 1.2 Puppet Labs Puppet Enterprise 1.1 Puppet Labs Puppet Enterprise 1.0 Puppet Labs Puppet 2.6.15 Puppet Labs Puppet 2.6.14 Puppet Labs Puppet 2.6.13 Puppet Labs Puppet 2.6.11 Puppet Labs Puppet 2.6.10 Puppet Labs Puppet 2.6 Gentoo Linux Debian Linux 6.0 s/390 |
| Not Vulnerable: | |
Discussion
Puppet CVE-2013-2274 Remote Code Execution Vulnerability
Puppet is prone to a remote code-execution vulnerability.
Successfully exploiting this issue will allow attackers to execute arbitrary code within the context of the application or cause denial-of-service conditions.
The issue is fixed in Puppet 2.6.18 and Puppet Enterprise 1.2.7.
Puppet is prone to a remote code-execution vulnerability.
Successfully exploiting this issue will allow attackers to execute arbitrary code within the context of the application or cause denial-of-service conditions.
The issue is fixed in Puppet 2.6.18 and Puppet Enterprise 1.2.7.
Exploit / POC
Puppet CVE-2013-2274 Remote Code Execution Vulnerability
Currently, we are not aware of any working exploits. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Currently, we are not aware of any working exploits. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution / Fix
Puppet CVE-2013-2274 Remote Code Execution Vulnerability
Solution:
Updates are available. Please see the references or vendor advisory for more information.
Solution:
Updates are available. Please see the references or vendor advisory for more information.