// For flags

CVE-2013-2716

 

Severity Score

5.0
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Puppet Labs Puppet Enterprise before 2.8.0 does not use a "randomized secret" in the CAS client config file (cas_client_config.yml) when upgrading from older 1.2.x or 2.0.x versions, which allows remote attackers to obtain console access via a crafted cookie.

Puppet Labs Puppet Enterprise antes de v2.8.0 no utiliza un "secreto aleatorio" en el archivo de configuración de cliente de CAS (cas_client_config.yml) que al actualizarse desde versiones v1.2.x v2.0.x o, permite a atacantes remotos obtener acceso a la consola a través de un cookie hecha a mano.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2013-03-27 CVE Reserved
  • 2013-04-10 CVE Published
  • 2023-03-07 EPSS Updated
  • 2024-08-06 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-310: Cryptographic Issues
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Puppet
Search vendor "Puppet"
Puppet Enterprise
Search vendor "Puppet" for product "Puppet Enterprise"
<= 2.7.2
Search vendor "Puppet" for product "Puppet Enterprise" and version " <= 2.7.2"
-
Affected
Puppet
Search vendor "Puppet"
Puppet Enterprise
Search vendor "Puppet" for product "Puppet Enterprise"
2.0.0
Search vendor "Puppet" for product "Puppet Enterprise" and version "2.0.0"
-
Affected
Puppet
Search vendor "Puppet"
Puppet Enterprise
Search vendor "Puppet" for product "Puppet Enterprise"
2.5.1
Search vendor "Puppet" for product "Puppet Enterprise" and version "2.5.1"
-
Affected
Puppet
Search vendor "Puppet"
Puppet Enterprise
Search vendor "Puppet" for product "Puppet Enterprise"
2.5.2
Search vendor "Puppet" for product "Puppet Enterprise" and version "2.5.2"
-
Affected
Puppetlabs
Search vendor "Puppetlabs"
Puppet
Search vendor "Puppetlabs" for product "Puppet"
1.0.0
Search vendor "Puppetlabs" for product "Puppet" and version "1.0.0"
enterprise
Affected
Puppetlabs
Search vendor "Puppetlabs"
Puppet
Search vendor "Puppetlabs" for product "Puppet"
1.1.0
Search vendor "Puppetlabs" for product "Puppet" and version "1.1.0"
enterprise
Affected
Puppetlabs
Search vendor "Puppetlabs"
Puppet
Search vendor "Puppetlabs" for product "Puppet"
1.2.0
Search vendor "Puppetlabs" for product "Puppet" and version "1.2.0"
enterprise
Affected
Puppetlabs
Search vendor "Puppetlabs"
Puppet
Search vendor "Puppetlabs" for product "Puppet"
2.5.0
Search vendor "Puppetlabs" for product "Puppet" and version "2.5.0"
enterprise
Affected
Puppetlabs
Search vendor "Puppetlabs"
Puppet
Search vendor "Puppetlabs" for product "Puppet"
2.6.0
Search vendor "Puppetlabs" for product "Puppet" and version "2.6.0"
enterprise
Affected