CVE-2013-1655
Published Mar 20, 2013
Last updated 5 years ago
Overview
- Description
- Puppet 2.7.x before 2.7.21 and 3.1.x before 3.1.1, when running Ruby 1.9.3 or later, allows remote attackers to execute arbitrary code via vectors related to "serialized attributes."
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-20
Evaluator
- Comment
- -
- Impact
- Per http://www.ubuntu.com/usn/usn-1759-1/ "A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 12.10 Ubuntu 12.04 LTS Ubuntu 11.10 "
- Solution
- Per http://www.ubuntu.com/usn/usn-1759-1/ "A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 12.10 Ubuntu 12.04 LTS Ubuntu 11.10 "
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:puppet:puppet:2.7.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BE56BA6B-BDC4-431E-81FD-D7ED5E8783E9" }, { "criteria": "cpe:2.3:a:puppet:puppet:2.7.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FDDDFB28-1971-4CCD-93D2-ABC08FE67F4A" }, { "criteria": "cpe:2.3:a:puppet:puppet:2.7.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "508105B4-619A-4A9D-8B2F-FE5992C1006A" }, { "criteria": "cpe:2.3:a:puppet:puppet:2.7.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "26DB96A5-A57D-452F-A452-98B11F51CAE6" }, { "criteria": "cpe:2.3:a:puppet:puppet:2.7.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D33AF704-FA05-4EA8-BE95-0177871A810F" }, { "criteria": "cpe:2.3:a:puppet:puppet:2.7.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "390FC5AE-4939-468C-B323-6B4E267A0F4C" }, { "criteria": "cpe:2.3:a:puppet:puppet:2.7.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "07DE4213-E233-402E-88C2-B7FF8D7B682C" }, { "criteria": "cpe:2.3:a:puppet:puppet:2.7.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4122D8E3-24AD-4A55-9F89-C3AAD50E638D" }, { "criteria": "cpe:2.3:a:puppet:puppet:2.7.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AF6D6B90-62BA-4944-A699-6D7C48AFD0A1" }, { "criteria": "cpe:2.3:a:puppet:puppet:2.7.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8EC6A7B3-5949-4439-994A-68DA65438F5D" }, { "criteria": "cpe:2.3:a:puppet:puppet:2.7.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5140C34D-589C-43DB-BCA7-8434EB173205" }, { "criteria": "cpe:2.3:a:puppet:puppet:2.7.13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E561C081-6262-46D3-AB17-01EEA6D3E988" }, { "criteria": "cpe:2.3:a:puppet:puppet:2.7.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4703802D-0E3A-4760-B660-6AE0AF74DD40" }, { "criteria": "cpe:2.3:a:puppet:puppet:2.7.16:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BE3D39F6-F9C8-4E7F-981A-265B04E85579" }, { "criteria": "cpe:2.3:a:puppet:puppet:2.7.17:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FEBB3936-7A81-4BD9-80B2-3F614980BBCE" }, { "criteria": "cpe:2.3:a:puppet:puppet:2.7.18:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A1EABC0F-A7A6-4C28-9331-3EEB6D39A0C2" }, { "criteria": "cpe:2.3:a:puppet:puppet_enterprise:3.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3CFF3B0A-2C66-445A-BB5C-136DCAA584FE" }, { "criteria": "cpe:2.3:a:puppetlabs:puppet:2.7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1E5192CB-094F-469E-A644-2255C4F44804" }, { "criteria": "cpe:2.3:a:puppetlabs:puppet:2.7.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D17D2752-CB0D-4CC8-8604-FEBF8DEE16E0" }, { "criteria": "cpe:2.3:a:puppetlabs:puppet:2.7.19:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "29BBE8DB-8560-4A57-9BCB-D709A697ECDE" }, { "criteria": "cpe:2.3:a:puppetlabs:puppet:2.7.20:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "10E0543B-5B1D-4522-945D-98BD63380500" }, { "criteria": "cpe:2.3:a:puppetlabs:puppet:2.7.20:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "817AB37A-F7B0-4E68-B10A-9E4A358793F3" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:ruby-lang:ruby:1.9:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "D9237145-35F8-4E05-B730-77C0F386E5B2" }, { "criteria": "cpe:2.3:a:ruby-lang:ruby:1.9.1:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "C78BB1D8-0505-484D-B824-1AA219F8B247" }, { "criteria": "cpe:2.3:a:ruby-lang:ruby:1.9.2:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "5178D04D-1C29-4353-8987-559AA07443EC" }, { "criteria": "cpe:2.3:a:ruby-lang:ruby:1.9.3:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "D0535DC9-EB0E-4745-80AC-4A020DF26E38" }, { "criteria": "cpe:2.3:a:ruby-lang:ruby:1.9.3:p0:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "94F5AA37-B466-4E2E-B217-5119BADDD87B" }, { "criteria": "cpe:2.3:a:ruby-lang:ruby:1.9.3:p125:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "6DF0F0F5-4022-4837-9B40-4B1127732CC9" }, { "criteria": "cpe:2.3:a:ruby-lang:ruby:1.9.3:p194:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "B3848B08-85C2-4AAD-AA33-CCEB80EF5B32" }, { "criteria": "cpe:2.3:a:ruby-lang:ruby:1.9.3:p286:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "B7927D40-2A3A-43AD-99F6-CE61882A1FF4" }, { "criteria": "cpe:2.3:a:ruby-lang:ruby:1.9.3:p383:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "AA406EC6-6CA5-40A6-A879-AA8940CBEF07" }, { "criteria": "cpe:2.3:a:ruby-lang:ruby:2.0:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "90E0471D-1323-4E67-B66C-DEBF3BBAEEAA" }, { "criteria": "cpe:2.3:a:ruby-lang:ruby:2.0.0:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "B03B7561-A854-4EFA-9E4E-CFC4EEAE4EE1" }, { "criteria": "cpe:2.3:a:ruby-lang:ruby:2.0.0:rc1:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "285A3431-BDFE-40C5-92CD-B18217757C23" }, { "criteria": "cpe:2.3:a:ruby-lang:ruby:2.0.0:rc2:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "D66B32CB-AC49-4A1C-85ED-6389F27CB319" } ], "operator": "OR" } ], "operator": "AND" } ]