| ID | CVE-2013-3567 | ||||||
| Sažetak | Puppet 2.7.x before 2.7.22 and 3.2.x before 3.2.2, and Puppet Enterprise before 2.8.2, deserializes untrusted YAML, which allows remote attackers to instantiate arbitrary Ruby classes and execute arbitrary code via a crafted REST API call. | ||||||
| Reference |
|
||||||
| CVSS |
|
||||||
| Pristup |
|
||||||
| Impact |
|
||||||
| CVSS vektor | AV:N/AC:L/Au:N/C:P/I:P/A:P | ||||||
| Zadnje važnije ažuriranje | 10-07-2019 - 18:10 | ||||||
| Objavljeno | 19-08-2013 - 23:55 |

