Puppet 2.7.x prior to 2.7.21 and 3.1.x prior to 3.1.1, when running Ruby 1.9.3 or later, allows remote malicious users to execute arbitrary code via vectors related to "serialized attributes."
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
puppet puppet 2.7.2 |
||
puppet puppet 2.7.3 |
||
puppet puppet 2.7.4 |
||
puppet puppet 2.7.5 |
||
puppet puppet 2.7.6 |
||
puppet puppet 2.7.7 |
||
puppet puppet 2.7.8 |
||
puppet puppet 2.7.9 |
||
puppet puppet 2.7.10 |
||
puppet puppet 2.7.11 |
||
puppet puppet 2.7.12 |
||
puppet puppet 2.7.13 |
||
puppet puppet 2.7.14 |
||
puppet puppet 2.7.16 |
||
puppet puppet 2.7.17 |
||
puppet puppet 2.7.18 |
||
puppet puppet enterprise 3.1.0 |
||
puppetlabs puppet 2.7.0 |
||
puppetlabs puppet 2.7.1 |
||
puppetlabs puppet 2.7.19 |
||
puppetlabs puppet 2.7.20 |