// For flags

CVE-2013-4761

Puppet: resource_type service code execution

Severity Score

5.6
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Unspecified vulnerability in Puppet 2.7.x before 2.7.23 and 3.2.x before 3.2.4, and Puppet Enterprise 2.8.x before 2.8.3 and 3.0.x before 3.0.1, allows remote attackers to execute arbitrary Ruby programs from the master via the resource_type service. NOTE: this vulnerability can only be exploited utilizing unspecified "local file system access" to the Puppet Master.

Vulnerabilidad sin especificar en Puppet 2.7.x anterior a 2.7.23 y 3.2.x anterior a 3.2.4, y Puppet Enterprise 2.8.x anterior a 2.8.3 y 3.0.x anterior a 3.0.1, permite a atacantes remotos ejecutar programas Ruby arbitrariamente desde el master a travĂ©s del servicio resource_type. NOTA: esta vulnerabilidad Ășnicamente puede ser explotada utilizando un "acceso local al sistema de ficheros no especificado" al Puppet Master.

Puppet allows provisioning, patching, and configuration of clients to be managed and automated. A flaw was found in the way Puppet handled YAML content during Representational State Transfer API calls. An attacker could construct a request containing a crafted YAML payload that would cause the Puppet master to execute arbitrary code. It was found that resource_type requests could be used to cause the Puppet master to load and run Ruby files from anywhere on the file system. In non-default configurations, a local user on the Puppet master server could use this flaw to have arbitrary Ruby code executed with the privileges of the Puppet master.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low
Attack Vector
Network
Attack Complexity
High
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
Attack Vector
Local
Attack Complexity
Medium
Authentication
Single
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2013-07-05 CVE Reserved
  • 2013-08-15 CVE Published
  • 2024-08-06 CVE Updated
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Puppet
Search vendor "Puppet"
Puppet
Search vendor "Puppet" for product "Puppet"
3.2.1
Search vendor "Puppet" for product "Puppet" and version "3.2.1"
-
Affected
Puppet
Search vendor "Puppet"
Puppet
Search vendor "Puppet" for product "Puppet"
3.2.2
Search vendor "Puppet" for product "Puppet" and version "3.2.2"
-
Affected
Puppet
Search vendor "Puppet"
Puppet
Search vendor "Puppet" for product "Puppet"
3.2.3
Search vendor "Puppet" for product "Puppet" and version "3.2.3"
-
Affected
Puppetlabs
Search vendor "Puppetlabs"
Puppet
Search vendor "Puppetlabs" for product "Puppet"
3.2.0
Search vendor "Puppetlabs" for product "Puppet" and version "3.2.0"
-
Affected
Puppet
Search vendor "Puppet"
Puppet
Search vendor "Puppet" for product "Puppet"
2.7.2
Search vendor "Puppet" for product "Puppet" and version "2.7.2"
-
Affected
Puppetlabs
Search vendor "Puppetlabs"
Puppet
Search vendor "Puppetlabs" for product "Puppet"
2.7.0
Search vendor "Puppetlabs" for product "Puppet" and version "2.7.0"
-
Affected
Puppetlabs
Search vendor "Puppetlabs"
Puppet
Search vendor "Puppetlabs" for product "Puppet"
2.7.1
Search vendor "Puppetlabs" for product "Puppet" and version "2.7.1"
-
Affected
Puppet
Search vendor "Puppet"
Puppet Enterprise
Search vendor "Puppet" for product "Puppet Enterprise"
2.8.0
Search vendor "Puppet" for product "Puppet Enterprise" and version "2.8.0"
-
Affected
Puppet
Search vendor "Puppet"
Puppet Enterprise
Search vendor "Puppet" for product "Puppet Enterprise"
2.8.1
Search vendor "Puppet" for product "Puppet Enterprise" and version "2.8.1"
-
Affected
Puppet
Search vendor "Puppet"
Puppet Enterprise
Search vendor "Puppet" for product "Puppet Enterprise"
2.8.2
Search vendor "Puppet" for product "Puppet Enterprise" and version "2.8.2"
-
Affected
Puppet
Search vendor "Puppet"
Puppet Enterprise
Search vendor "Puppet" for product "Puppet Enterprise"
3.0.0
Search vendor "Puppet" for product "Puppet Enterprise" and version "3.0.0"
-
Affected