Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-3kma-3ffw-8qd9
Vulnerability ID VCID-3kma-3ffw-8qd9
Aliases CVE-2013-3567
GHSA-f7p5-w2cr-7cp7
Summary Improper Input Validation Puppet 2.7.x before 2.7.22 and 3.2.x before 3.2.2, and Puppet Enterprise before 2.8.2, deserializes untrusted YAML, which allows remote attackers to instantiate arbitrary Ruby classes and execute arbitrary code via a crafted REST API call.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (5)
System Score Found at
generic_textual HIGH http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00002.html
generic_textual HIGH http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00019.html
generic_textual HIGH http://rhn.redhat.com/errata/RHSA-2013-1283.html
generic_textual HIGH http://rhn.redhat.com/errata/RHSA-2013-1284.html
epss 0.06459 https://api.first.org/data/v1/epss?cve=CVE-2013-3567
epss 0.06459 https://api.first.org/data/v1/epss?cve=CVE-2013-3567
epss 0.06459 https://api.first.org/data/v1/epss?cve=CVE-2013-3567
epss 0.06459 https://api.first.org/data/v1/epss?cve=CVE-2013-3567
epss 0.06459 https://api.first.org/data/v1/epss?cve=CVE-2013-3567
epss 0.06459 https://api.first.org/data/v1/epss?cve=CVE-2013-3567
epss 0.06459 https://api.first.org/data/v1/epss?cve=CVE-2013-3567
epss 0.06459 https://api.first.org/data/v1/epss?cve=CVE-2013-3567
epss 0.06459 https://api.first.org/data/v1/epss?cve=CVE-2013-3567
epss 0.06459 https://api.first.org/data/v1/epss?cve=CVE-2013-3567
epss 0.06459 https://api.first.org/data/v1/epss?cve=CVE-2013-3567
epss 0.06459 https://api.first.org/data/v1/epss?cve=CVE-2013-3567
epss 0.06459 https://api.first.org/data/v1/epss?cve=CVE-2013-3567
cvssv2 9 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-f7p5-w2cr-7cp7
generic_textual HIGH https://github.com/puppetlabs/puppet
generic_textual HIGH https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puppet/CVE-2013-3567.yml
generic_textual HIGH https://nvd.nist.gov/vuln/detail/CVE-2013-3567
generic_textual HIGH https://puppetlabs.com/security/cve/cve-2013-3567
generic_textual HIGH https://www.puppet.com/security/cve/cve-2013-3567-unauthenticated-remote-code-execution-vulnerability
generic_textual HIGH http://www.debian.org/security/2013/dsa-2715
generic_textual HIGH http://www.ubuntu.com/usn/USN-1886-1
No exploits are available.
Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.91023
EPSS Score 0.06459
Published At April 1, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T12:47:27.622589+00:00 GitLab Importer Import https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/puppet/CVE-2013-3567.yml 38.0.0