Search for packages
| purl | pkg:gem/puppet@3.2.0 |
| Tags | Ghost |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 4.0 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-3kma-3ffw-8qd9
Aliases: CVE-2013-3567 GHSA-f7p5-w2cr-7cp7 |
Improper Input Validation Puppet 2.7.x before 2.7.22 and 3.2.x before 3.2.2, and Puppet Enterprise before 2.8.2, deserializes untrusted YAML, which allows remote attackers to instantiate arbitrary Ruby classes and execute arbitrary code via a crafted REST API call. |
Affected by 16 other vulnerabilities. |
|
VCID-5g6u-uvej-xbad
Aliases: CVE-2013-4761 GHSA-cj43-9h3w-v976 |
Moderate severity vulnerability that affects puppet Unspecified vulnerability in Puppet 2.7.x before 2.7.23 and 3.2.x before 3.2.4, and Puppet Enterprise 2.8.x before 2.8.3 and 3.0.x before 3.0.1, allows remote attackers to execute arbitrary Ruby programs from the master via the resource_type service. NOTE: this vulnerability can only be exploited utilizing unspecified "local file system access" to the Puppet Master. |
Affected by 16 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-01T15:56:19.607958+00:00 | GHSA Importer | Affected by | VCID-5g6u-uvej-xbad | https://github.com/advisories/GHSA-cj43-9h3w-v976 | 38.0.0 |
| 2026-04-01T15:56:18.152765+00:00 | GHSA Importer | Affected by | VCID-3kma-3ffw-8qd9 | https://github.com/advisories/GHSA-f7p5-w2cr-7cp7 | 38.0.0 |
| 2026-04-01T12:47:27.639164+00:00 | GitLab Importer | Affected by | VCID-3kma-3ffw-8qd9 | https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/puppet/CVE-2013-3567.yml | 38.0.0 |