Amazon Linux AMI : puppet Arbitrary Code Execution (ALAS-2013-213)

This script is Copyright (C) 2013 Tenable Network Security, Inc.


Synopsis :

The remote Amazon Linux AMI host is missing a security update.

Description :

When making REST api calls, the puppet master takes YAML from an
untrusted client, deserializes it, and then calls methods on the
resulting object. A YAML payload can be crafted to cause the
deserialization to construct an instance of any class available in the
ruby process, which allows an attacker to execute code contained in
the payload.

See also :

http://www.nessus.org/u?2bf70a97

Solution :

Run 'yum update puppet' to update your system.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

Family: Amazon Linux Local Security Checks

Nessus Plugin ID: 69771 ()

Bugtraq ID:

CVE ID: CVE-2013-3567