Puppet 2.7.x before 2.7.22 and 3.2.x before 3.2.2, and Puppet Enterprise before 2.8.2, deserializes untrusted YAML, which allows remote attackers to instantiate arbitrary Ruby classes and execute arbitrary code via a crafted REST API call.
{
"nvd_published_at": "2013-08-19T23:55:08Z",
"github_reviewed": true,
"github_reviewed_at": "2020-06-16T21:34:01Z",
"severity": "HIGH",
"cwe_ids": [
"CWE-20"
]
}