CVE-2013-1652
Severity CVSS v4.0:
Pending analysis
Type:
CWE-264
Permissions, Privileges, and Access Control
Publication date:
20/03/2013
Last modified:
11/04/2025
Description
Puppet before 2.6.18, 2.7.x before 2.7.21, and 3.1.x before 3.1.1, and Puppet Enterprise before 1.2.7 and 2.7.x before 2.7.2 allows remote authenticated users with a valid certificate and private key to read arbitrary catalogs or poison the master's cache via unspecified vectors.
Impact
Base Score 2.0
4.90
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:puppetlabs:puppet:*:*:*:*:*:*:*:* | 2.6.17 (including) | |
| cpe:2.3:a:puppet:puppet:2.7.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:puppet:puppet:2.7.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:puppet:puppet:2.7.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:puppet:puppet:2.7.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:puppet:puppet:2.7.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:puppet:puppet:2.7.7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:puppet:puppet:2.7.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:puppet:puppet:2.7.9:*:*:*:*:*:*:* | ||
| cpe:2.3:a:puppet:puppet:2.7.10:*:*:*:*:*:*:* | ||
| cpe:2.3:a:puppet:puppet:2.7.11:*:*:*:*:*:*:* | ||
| cpe:2.3:a:puppet:puppet:2.7.12:*:*:*:*:*:*:* | ||
| cpe:2.3:a:puppet:puppet:2.7.13:*:*:*:*:*:*:* | ||
| cpe:2.3:a:puppet:puppet:2.7.14:*:*:*:*:*:*:* | ||
| cpe:2.3:a:puppet:puppet:2.7.16:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00004.html
- http://lists.opensuse.org/opensuse-updates/2013-04/msg00056.html
- http://rhn.redhat.com/errata/RHSA-2013-0710.html
- http://secunia.com/advisories/52596
- http://ubuntu.com/usn/usn-1759-1
- http://www.debian.org/security/2013/dsa-2643
- http://www.securityfocus.com/bid/58443
- https://puppetlabs.com/security/cve/cve-2013-1652/
- http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00004.html
- http://lists.opensuse.org/opensuse-updates/2013-04/msg00056.html
- http://rhn.redhat.com/errata/RHSA-2013-0710.html
- http://secunia.com/advisories/52596
- http://ubuntu.com/usn/usn-1759-1
- http://www.debian.org/security/2013/dsa-2643
- http://www.securityfocus.com/bid/58443
- https://puppetlabs.com/security/cve/cve-2013-1652/



