6.5
CVSSv2

CVE-2013-2274

Published: 20/03/2013 Updated: 10/07/2019
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
VMScore: 578
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

Puppet 2.6.x prior to 2.6.18 and Puppet Enterprise 1.2.x prior to 1.2.7 allows remote authenticated users to execute arbitrary code on the puppet master, or an agent with puppet kick enabled, via a crafted request for a report.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

puppet puppet 2.6.14

puppet puppet 2.6.12

puppet puppet 2.6.1

puppet puppet 2.6.8

puppet puppet 2.6.0

puppet puppet 2.6.15

puppet puppet 2.6.11

puppet puppet 2.6.10

puppet puppet 2.6.5

puppetlabs puppet 2.6.17

puppet puppet 2.6.16

puppet puppet 2.6.4

puppet puppet 2.6.3

puppet puppet 2.6.2

puppet puppet 2.6.13

puppet puppet 2.6.9

puppet puppet 2.6.7

puppet puppet 2.6.6

puppet puppet enterprise 1.2.0

Vendor Advisories

Synopsis Important: puppet security update Type/Severity Security Advisory: Important Topic Updated puppet packages that fix several security issues are now availablefor Red Hat OpenStack FolsomThe Red Hat Security Response Team has rated this update as havingimportant security impact Common Vulnerability ...
Multiple vulnerabilities were discovered in Puppet, a centralized configuration management system CVE-2013-1640 An authenticated malicious client may request its catalog from the puppet master, and cause the puppet master to execute arbitrary code The puppet master must be made to invoke the template or inline_template functions ...