This script is Copyright (C) 2013-2014 Tenable Network Security, Inc.
A web application on the remote host has a code execution
According to its self-reported version number, the Puppet install on
the remote host has a remote code execution vulnerability. When making
REST API calls, the puppet master takes YAML from an untrusted client,
deserializes it, and then calls methods on the resulting object. A
YAML payload can be crafted to cause the deserialization to construct
an instance of any class available in the ruby process, which allows
an attacker to execute code contained in the payload.
See also :
Upgrade to Puppet 2.7.22 / 3.2.2 or Puppet Enterprise 2.8.2 or
Risk factor :
High / CVSS Base Score : 7.5
CVSS Temporal Score : 6.5
Public Exploit Available : false
Family: CGI abuses
Nessus Plugin ID: 70662 ()
Bugtraq ID: 60664
CVE ID: CVE-2013-3567
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.