Unrated severityNVD Advisory· Published Mar 20, 2013· Updated Apr 29, 2026
CVE-2013-1653
CVE-2013-1653
Description
Puppet before 2.6.18, 2.7.x before 2.7.21, and 3.1.x before 3.1.1, and Puppet Enterprise before 1.2.7 and 2.7.x before 2.7.2, when listening for incoming connections is enabled and allowing access to the "run" REST endpoint is allowed, allows remote authenticated users to execute arbitrary code via a crafted HTTP request.
Affected products
37cpe:2.3:a:puppetlabs:puppet:1.0:*:*:*:enterprise:*:*:*+ 13 more
- cpe:2.3:a:puppetlabs:puppet:1.0:*:*:*:enterprise:*:*:*
- cpe:2.3:a:puppetlabs:puppet:1.1:*:*:*:enterprise:*:*:*
- cpe:2.3:a:puppetlabs:puppet:1.2.0:*:*:*:enterprise:*:*:*
- cpe:2.3:a:puppetlabs:puppet:1.2.1:*:*:*:enterprise:*:*:*
- cpe:2.3:a:puppetlabs:puppet:1.2.2:*:*:*:enterprise:*:*:*
- cpe:2.3:a:puppetlabs:puppet:1.2.3:*:*:*:enterprise:*:*:*
- cpe:2.3:a:puppetlabs:puppet:1.2.4:*:*:*:enterprise:*:*:*
- cpe:2.3:a:puppetlabs:puppet:1.2.5:*:*:*:enterprise:*:*:*
- cpe:2.3:a:puppetlabs:puppet:1.2.6:*:*:*:enterprise:*:*:*
- cpe:2.3:a:puppetlabs:puppet:2.7.0:*:*:*:*:*:*:*
- cpe:2.3:a:puppetlabs:puppet:2.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:puppetlabs:puppet:2.7.19:*:*:*:*:*:*:*
- cpe:2.3:a:puppetlabs:puppet:2.7.20:*:*:*:*:*:*:*
- cpe:2.3:a:puppetlabs:puppet:2.7.20:rc1:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet:*:*:*:*:*:*:*:*+ 16 more
- cpe:2.3:a:puppet:puppet:*:*:*:*:*:*:*:*range: >=2.6.0,<=2.6.17
- cpe:2.3:a:puppet:puppet:2.7.10:*:*:*:*:*:*:*
- cpe:2.3:a:puppet:puppet:2.7.11:*:*:*:*:*:*:*
- cpe:2.3:a:puppet:puppet:2.7.12:*:*:*:*:*:*:*
- cpe:2.3:a:puppet:puppet:2.7.13:*:*:*:*:*:*:*
- cpe:2.3:a:puppet:puppet:2.7.14:*:*:*:*:*:*:*
- cpe:2.3:a:puppet:puppet:2.7.16:*:*:*:*:*:*:*
- cpe:2.3:a:puppet:puppet:2.7.17:*:*:*:*:*:*:*
- cpe:2.3:a:puppet:puppet:2.7.18:*:*:*:*:*:*:*
- cpe:2.3:a:puppet:puppet:2.7.2:*:*:*:*:*:*:*
- cpe:2.3:a:puppet:puppet:2.7.3:*:*:*:*:*:*:*
- cpe:2.3:a:puppet:puppet:2.7.4:*:*:*:*:*:*:*
- cpe:2.3:a:puppet:puppet:2.7.5:*:*:*:*:*:*:*
- cpe:2.3:a:puppet:puppet:2.7.6:*:*:*:*:*:*:*
- cpe:2.3:a:puppet:puppet:2.7.7:*:*:*:*:*:*:*
- cpe:2.3:a:puppet:puppet:2.7.8:*:*:*:*:*:*:*
- cpe:2.3:a:puppet:puppet:2.7.9:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet_enterprise:2.7.0:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:a:puppet:puppet_enterprise:2.7.0:*:*:*:*:*:*:*
- cpe:2.3:a:puppet:puppet_enterprise:2.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:puppet:puppet_enterprise:3.1.0:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- lists.opensuse.org/opensuse-security-announce/2013-04/msg00004.htmlnvdThird Party Advisory
- lists.opensuse.org/opensuse-updates/2013-04/msg00056.htmlnvdThird Party Advisory
- secunia.com/advisories/52596nvdThird Party Advisory
- ubuntu.com/usn/usn-1759-1nvdThird Party Advisory
- www.debian.org/security/2013/dsa-2643nvdThird Party Advisory
- www.securityfocus.com/bid/58446nvdThird Party AdvisoryVDB Entry
- puppetlabs.com/security/cve/cve-2013-1653/nvdVendor Advisory
News mentions
0No linked articles in our index yet.