Arbitrary Code Execution via Untrusted YAML Deserialization in Puppet

Arbitrary Code Execution via Untrusted YAML Deserialization in Puppet

CVE-2013-3567 · HIGH Severity

AV:N/AC:L/AU:N/C:P/I:P/A:P

Puppet 2.7.x before 2.7.22 and 3.2.x before 3.2.2, and Puppet Enterprise before 2.8.2, deserializes untrusted YAML, which allows remote attackers to instantiate arbitrary Ruby classes and execute arbitrary code via a crafted REST API call.

Learn more about our Api Penetration Testing.