{"id":"CVE-2013-2274","details":"Puppet 2.6.x before 2.6.18 and Puppet Enterprise 1.2.x before 1.2.7 allows remote authenticated users to execute arbitrary code on the puppet master, or an agent with puppet kick enabled, via a crafted request for a report.","modified":"2026-01-27T04:12:10.949503Z","published":"2013-03-20T16:55:01Z","withdrawn":"2026-01-27T04:12:10.949503Z","references":[{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2013-0710.html"},{"type":"ADVISORY","url":"http://secunia.com/advisories/52596"},{"type":"ADVISORY","url":"http://www.debian.org/security/2013/dsa-2643"},{"type":"ADVISORY","url":"https://puppetlabs.com/security/cve/cve-2013-2274/"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00004.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-updates/2013-04/msg00056.html"},{"type":"WEB","url":"http://www.securityfocus.com/bid/58447"}],"schema_version":"1.7.3"}