Skip to navigation

CVE Database

CVE-2013-1653

Impact: Important
Public: 2013-03-12
Bugzilla: 919774: CVE-2013-1653 Puppet: kick connection HTTP PUT request arbitrary code execution

Details

The MITRE CVE dictionary describes this issue as:

Puppet before 2.6.18, 2.7.x before 2.7.21, and 3.1.x before 3.1.1, and Puppet Enterprise before 1.2.7 and 2.7.x before 2.7.2, when listening for incoming connections is enabled and allowing access to the "run" REST endpoint is allowed, allows remote authenticated users to execute arbitrary code via a crafted HTTP request.

Find out more about CVE-2013-1653 from the MITRE CVE dictionary and NIST NVD.

CVSS v2 metrics

NOTE: The following CVSS v2 metrics and score provided are preliminary and subject to review.

Base Score: 6.0
Base Metrics: AV:N/AC:M/Au:S/C:P/I:P/A:P
Access Vector: Network
Access Complexity: Medium
Authentication: Single Instance
Confidentiality Impact: Partial
Integrity Impact: Partial
Availability Impact: Partial

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat security errata

Platform Errata Release Date

External References

This page is generated automatically and has not been checked for errors or omissions.

For clarification or corrections please contact the Red Hat Security Response Team.