Vigil@nce - Puppet Enterprise 2.8: multiple vulnerabilities
January 2014 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can use several vulnerabilities of Puppet Enterprise
2.8.
Impacted products: Debian, Puppet
Severity: 2/4
Creation date: 30/12/2013
DESCRIPTION OF THE VULNERABILITY
Several vulnerabilities were announced in Puppet Enterprise 2.8.
An attacker can generate a buffer overflow during the conversion
of real number by Ruby, in order to trigger a denial of service,
and possibly to execute code (VIGILANCE-VUL-13817
(https://vigilance.fr/tree/1/13817?w=66901)). [severity:2/4;
BID-63873, CERTA-2013-AVI-647, CVE-2013-4164]
An attacker can use a regular expression in RubyGems, in order to
trigger a denial of service. [severity:2/4; CVE-2013-4363]
An attacker can use a symbolic link, in order to corrupt a file.
[severity:2/4; BID-64552, CVE-2013-4969]
An attacker can trigger a Cross Site Scripting in Ruby on Rails,
in order to execute JavaScript code in the context of the web
site. [severity:2/4; CVE-2013-6415]
An attacker can use a SQL injection in Rack and Rails, in order to
read or alter data. [severity:2/4; CVE-2013-6417]
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/Puppet-Enterprise-2-8-multiple-vulnerabilities-14000