Puppet Unauthenticated Remote Code Execution

This script is Copyright (C) 2013-2014 Tenable Network Security, Inc.

Synopsis :

A web application on the remote host has a code execution

Description :

According to its self-reported version number, the Puppet install on
the remote host has a remote code execution vulnerability. When making
REST API calls, the puppet master takes YAML from an untrusted client,
deserializes it, and then calls methods on the resulting object. A
YAML payload can be crafted to cause the deserialization to construct
an instance of any class available in the ruby process, which allows
an attacker to execute code contained in the payload.

See also :


Solution :

Upgrade to Puppet 2.7.22 / 3.2.2 or Puppet Enterprise 2.8.2 or

Risk factor :

High / CVSS Base Score : 7.5
CVSS Temporal Score : 6.5
Public Exploit Available : false

Family: CGI abuses

Nessus Plugin ID: 70662 ()

Bugtraq ID: 60664

CVE ID: CVE-2013-3567

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now