Vigil@nce - Puppet Enterprise 3.1: multiple vulnerabilities
January 2014 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can use several vulnerabilities of Puppet Enterprise
3.1.
Impacted products: Puppet
Severity: 2/4
Creation date: 30/12/2013
DESCRIPTION OF THE VULNERABILITY
Several vulnerabilities were announced in Puppet Enterprise 3.1.
An attacker can generate a buffer overflow during the conversion
of real number by Ruby, in order to trigger a denial of service,
and possibly to execute code (VIGILANCE-VUL-13817
(https://vigilance.fr/tree/1/13817?w=66901)). [severity:2/4;
BID-63873, CERTA-2013-AVI-647, CVE-2013-4164]
An attacker can use a regular expression in RubyGems, in order to
trigger a denial of service. [severity:2/4; CVE-2013-4363]
An attacker can trigger a Cross Site Scripting in Ruby on Rails,
in order to execute JavaScript code in the context of the web
site. [severity:2/4; CVE-2013-4491]
An attacker can use a symbolic link, in order to corrupt a file.
[severity:2/4; BID-64552, CVE-2013-4969]
An attacker can use an invalid MIME type in Action View, in order
to trigger a denial of service. [severity:2/4; CVE-2013-6414]
An attacker can trigger a Cross Site Scripting in Ruby on Rails,
in order to execute JavaScript code in the context of the web
site. [severity:2/4; CVE-2013-6415]
An attacker can use a SQL injection in Rack and Rails, in order to
read or alter data. [severity:2/4; CVE-2013-6417]
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/Puppet-Enterprise-3-1-multiple-vulnerabilities-13999