CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
5.4 | $0-$5k | 0.00 |
A vulnerability was found in Puppetlabs Puppet up to 3.2.3 (Service Management Software). It has been classified as problematic. This affects an unknown part of the component File System. The manipulation with an unknown input leads to a remote code execution vulnerability. This is going to have an impact on confidentiality, integrity, and availability. The summary by CVE is:
Unspecified vulnerability in Puppet 2.7.x before 2.7.23 and 3.2.x before 3.2.4, and Puppet Enterprise 2.8.x before 2.8.3 and 3.0.x before 3.0.1, allows remote attackers to execute arbitrary Ruby programs from the master via the resource_type service. NOTE: this vulnerability can only be exploited utilizing unspecified "local file system access" to the Puppet Master.
The weakness was published 08/20/2013 by mose (Website). The advisory is shared at debian.org. This vulnerability is uniquely identified as CVE-2013-4761 since 07/05/2013. The exploitability is told to be difficult. It is possible to initiate the attack remotely. No form of authentication is needed for exploitation. Neither technical details nor an exploit are publicly available.
The vulnerability scanner Nessus provides a plugin with the ID 69395 (FreeBSD : puppet -- multiple vulnerabilities (2b2f6092-0694-11e3-9e8e-000c29f6ae42)), which helps to determine the existence of the flaw in a target environment. It is assigned to the family FreeBSD Local Security Checks. The commercial vulnerability scanner Qualys is able to test this issue with plugin 350525 (Amazon Linux Security Advisory for puppet: ALAS-2013-219).
Upgrading to version 3.2.1 eliminates this vulnerability.
The vulnerability is also documented in the vulnerability database at Tenable (69395). Similar entry is available at 64728.
Product
Type
Vendor
Name
Version
License
CPE 2.3
CPE 2.2
CVSSv4
VulDB CVSS-B Score: 🔍VulDB CVSS-BT Score: 🔍
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.6VulDB Meta Temp Score: 5.4
VulDB Base Score: 5.6
VulDB Temp Score: 5.4
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Remote Code ExecutionCWE: Unknown
ATT&CK: Unknown
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Nessus ID: 69395
Nessus Name: FreeBSD : puppet -- multiple vulnerabilities (2b2f6092-0694-11e3-9e8e-000c29f6ae42)
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
Nessus Port: 🔍
OpenVAS ID: 892761
OpenVAS Name: Debian Security Advisory DSA 2761-1 (puppet - several vulnerabilities
OpenVAS File: 🔍
OpenVAS Family: 🔍
Qualys ID: 🔍
Qualys Name: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: Puppet 3.2.1
Timeline
07/05/2013 🔍08/15/2013 🔍
08/15/2013 🔍
08/19/2013 🔍
08/20/2013 🔍
08/20/2013 🔍
08/20/2013 🔍
03/24/2015 🔍
01/04/2022 🔍
Sources
Vendor: puppet.comAdvisory: dsa-2761
Researcher: mose
Status: Not defined
Confirmation: 🔍
CVE: CVE-2013-4761 (🔍)
OVAL: 🔍
Vulnerability Center: 41120 - Puppet and Puppet Enterprise \x27resource_type\x27 Unauthorized Arbitrary File Upload Vulnerability, Low
SecurityFocus: 61805 - Puppet CVE-2013-4956 Security Bypass Vulnerability
See also: 🔍
Entry
Created: 03/24/2015 15:54Updated: 01/04/2022 20:35
Changes: 03/24/2015 15:54 (67), 05/09/2017 09:03 (6), 01/04/2022 20:21 (3), 01/04/2022 20:28 (1), 01/04/2022 20:35 (1)
Complete: 🔍
No comments yet. Languages: en.
Please log in to comment.