Arbitrary Code Execution via Untrusted YAML Deserialization in Puppet
CVE-2013-3567 · HIGH Severity
AV:N/AC:L/AU:N/C:P/I:P/A:P
Puppet 2.7.x before 2.7.22 and 3.2.x before 3.2.2, and Puppet Enterprise before 2.8.2, deserializes untrusted YAML, which allows remote attackers to instantiate arbitrary Ruby classes and execute arbitrary code via a crafted REST API call.
Learn more about our Api Penetration Testing.