Remote code execution vulnerability in the template and inline_template functions in the master server in PuppetID: oval:org.secpod.oval:def:10653 | Date: (C)2013-04-08 (M)2022-01-24 |
Class: VULNERABILITY | Family: macos |
The host is installed with Puppet before 2.6.18, 2.7.x before 2.7.21 or 3.1.x before 3.1.1 and is prone to remote code execution vulnerability. A flaw is present in the application, which fails to handle a crafted catalog request. Successful exploitation allows attackers to execute arbitrary code.
Platform: |
Apple Mac OS X 10.8 |
Apple Mac OS X 10.9 |
Apple Mac OS X 10.10 |
Apple Mac OS X Server 10.8 |
Apple Mac OS X Server 10.9 |
Apple Mac OS X Server 10.10 |