Hide Forgot
Moses Mendoza (moses) reports: CVE-2013-2274 - Remote code execution on master from authenticated clients * Affected versions: 2.6.x * Patched versions: 2.6.18 A bug in Puppet allows an authenticated client to execute arbitrary code on the puppet master in its default configuration. Given a valid certificate and private key, a client can construct an HTTP PUT request that is authorized to save the client's own report, but the request will actually cause the puppet master to execute arbitrary code. External References: https://puppetlabs.com/security/cve/cve-2013-2274/
Created puppet tracking bugs for this issue Affects: epel-all [bug 920843]
Created attachment 710423 [details] puppet-2.6.17-CVE-Rollup.patch
Acknowledgements: Red Hat would like to thank Puppet Labs for reporting this issue.
This issue has been addressed in following products: OpenStack Folsom for RHEL 6 Via RHSA-2013:0710 https://rhn.redhat.com/errata/RHSA-2013-0710.html
puppet-2.6.18-2.el5 has been pushed to the Fedora EPEL 5 stable repository. If problems still persist, please make note of it in this bug report.
puppet-2.6.18-2.el6 has been pushed to the Fedora EPEL 6 stable repository. If problems still persist, please make note of it in this bug report.
Removed due to typo.