CVE-2013-1653

high

Description

Puppet before 2.6.18, 2.7.x before 2.7.21, and 3.1.x before 3.1.1, and Puppet Enterprise before 1.2.7 and 2.7.x before 2.7.2, when listening for incoming connections is enabled and allowing access to the "run" REST endpoint is allowed, allows remote authenticated users to execute arbitrary code via a crafted HTTP request.

References

https://puppetlabs.com/security/cve/cve-2013-1653/

http://www.securityfocus.com/bid/58446

http://www.debian.org/security/2013/dsa-2643

http://ubuntu.com/usn/usn-1759-1

http://secunia.com/advisories/52596

http://lists.opensuse.org/opensuse-updates/2013-04/msg00056.html

http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00004.html

Details

Source: Mitre, NVD

Published: 2013-03-20

Updated: 2024-11-21

Risk Information

CVSS v2

Base Score: 7.1

Vector: CVSS2#AV:N/AC:H/Au:S/C:C/I:C/A:C

Severity: High

CVSS v3

Base Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Severity: High