Puppet Unauthenticated Remote Code Execution

This script is Copyright (C) 2013-2014 Tenable Network Security, Inc.


Synopsis :

A web application on the remote host has a code execution
vulnerability.

Description :

According to its self-reported version number, the Puppet install on
the remote host has a remote code execution vulnerability. When making
REST API calls, the puppet master takes YAML from an untrusted client,
deserializes it, and then calls methods on the resulting object. A
YAML payload can be crafted to cause the deserialization to construct
an instance of any class available in the ruby process, which allows
an attacker to execute code contained in the payload.

See also :

https://puppetlabs.com/security/cve/cve-2013-3567

Solution :

Upgrade to Puppet 2.7.22 / 3.2.2 or Puppet Enterprise 2.8.2 or
later.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 6.5
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false

Family: CGI abuses

Nessus Plugin ID: 70662 ()

Bugtraq ID: 60664

CVE ID: CVE-2013-3567