{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"moderate"},"category":"csaf_vex","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"SUSE CVE-2013-1640","title":"Title"},{"category":"description","text":"The (1) template and (2) inline_template functions in the master server in Puppet before 2.6.18, 2.7.x before 2.7.21, and 3.1.x before 3.1.1, and Puppet Enterprise before 1.2.7 and 2.7.x before 2.7.2 allows remote authenticated users to execute arbitrary code via a crafted catalog request.","title":"Description of the CVE"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"CVE-2013-1640","url":"https://www.suse.com/security/cve/CVE-2013-1640"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 809839 for CVE-2013-1640","url":"https://bugzilla.suse.com/809839"},{"category":"external","summary":"SUSE Bug 880224 for CVE-2013-1640","url":"https://bugzilla.suse.com/880224"},{"category":"external","summary":"Advisory link for SUSE-SU-2013:0618-1","url":"https://lists.suse.com/pipermail/sle-security-updates/2013-April/000414.html"}],"title":"SUSE CVE CVE-2013-1640","tracking":{"current_release_date":"2026-03-16T00:42:59Z","generator":{"date":"2023-02-15T05:40:37Z","engine":{"name":"cve-database.git:bin/generate-csaf-vex.pl","version":"1"}},"id":"CVE-2013-1640","initial_release_date":"2023-02-15T05:40:37Z","revision_history":[{"date":"2023-02-15T05:40:37Z","number":"2","summary":"Current version"},{"date":"2023-12-08T04:58:04Z","number":"3","summary":"Current version"},{"date":"2025-03-14T07:16:09Z","number":"4","summary":"Current version"},{"date":"2025-03-16T13:22:21Z","number":"5","summary":"Current version"},{"date":"2025-04-25T12:30:45Z","number":"6","summary":"Current version"},{"date":"2026-03-16T00:42:59Z","number":"7","summary":"severity changed from important to moderate"}],"status":"interim","version":"7"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_name","name":"SUSE Linux Enterprise Desktop 11 SP2","product":{"name":"SUSE Linux Enterprise Desktop 11 SP2","product_id":"SUSE Linux Enterprise Desktop 11 SP2","product_identification_helper":{"cpe":"cpe:/o:suse:suse_sled:11:sp2"}}},{"category":"product_name","name":"SUSE Linux Enterprise Server 11 SP1-TERADATA","product":{"name":"SUSE Linux Enterprise Server 11 SP1-TERADATA","product_id":"SUSE Linux Enterprise Server 11 SP1-TERADATA","product_identification_helper":{"cpe":"cpe:/o:suse:sles:11:sp1:teradata"}}},{"category":"product_name","name":"SUSE Linux Enterprise Server 11 SP2","product":{"name":"SUSE Linux Enterprise Server 11 SP2","product_id":"SUSE Linux Enterprise Server 11 SP2","product_identification_helper":{"cpe":"cpe:/o:suse:suse_sles:11:sp2"}}},{"category":"product_name","name":"SUSE Linux Enterprise Server for SAP Applications 11 SP2","product":{"name":"SUSE Linux Enterprise Server for SAP Applications 11 SP2","product_id":"SUSE Linux Enterprise Server for SAP Applications 11 SP2","product_identification_helper":{"cpe":"cpe:/o:suse:sles_sap:11:sp2"}}},{"category":"product_version","name":"puppet-2.6.18-0.4.2","product":{"name":"puppet-2.6.18-0.4.2","product_id":"puppet-2.6.18-0.4.2","product_identification_helper":{"cpe":"cpe:2.3:a:puppet:puppet:2.6.18:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/puppet@2.6.18-0.4.2?upstream=puppet-2.6.18-0.4.2.src.rpm"}}},{"category":"product_version","name":"puppet-server-2.6.18-0.4.2","product":{"name":"puppet-server-2.6.18-0.4.2","product_id":"puppet-server-2.6.18-0.4.2","product_identification_helper":{"cpe":"cpe:2.3:a:puppet:puppet:2.6.18:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/puppet-server@2.6.18-0.4.2?upstream=puppet-2.6.18-0.4.2.src.rpm"}}},{"category":"product_version","name":"pwdutils-3.2.8-0.2.35","product":{"name":"pwdutils-3.2.8-0.2.35","product_id":"pwdutils-3.2.8-0.2.35","product_identification_helper":{"purl":"pkg:rpm/suse/pwdutils@3.2.8-0.2.35?upstream=pwdutils-3.2.8-0.2.35.src.rpm"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"puppet-2.6.18-0.4.2 as component of SUSE Linux Enterprise Desktop 11 SP2","product_id":"SUSE Linux Enterprise Desktop 11 SP2:puppet-2.6.18-0.4.2"},"product_reference":"puppet-2.6.18-0.4.2","relates_to_product_reference":"SUSE Linux Enterprise Desktop 11 SP2"},{"category":"default_component_of","full_product_name":{"name":"puppet-2.6.18-0.4.2 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA","product_id":"SUSE Linux Enterprise Server 11 SP1-TERADATA:puppet-2.6.18-0.4.2"},"product_reference":"puppet-2.6.18-0.4.2","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP1-TERADATA"},{"category":"default_component_of","full_product_name":{"name":"puppet-server-2.6.18-0.4.2 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA","product_id":"SUSE Linux Enterprise Server 11 SP1-TERADATA:puppet-server-2.6.18-0.4.2"},"product_reference":"puppet-server-2.6.18-0.4.2","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP1-TERADATA"},{"category":"default_component_of","full_product_name":{"name":"pwdutils-3.2.8-0.2.35 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA","product_id":"SUSE Linux Enterprise Server 11 SP1-TERADATA:pwdutils-3.2.8-0.2.35"},"product_reference":"pwdutils-3.2.8-0.2.35","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP1-TERADATA"},{"category":"default_component_of","full_product_name":{"name":"puppet-2.6.18-0.4.2 as component of SUSE Linux Enterprise Server 11 SP2","product_id":"SUSE Linux Enterprise Server 11 SP2:puppet-2.6.18-0.4.2"},"product_reference":"puppet-2.6.18-0.4.2","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP2"},{"category":"default_component_of","full_product_name":{"name":"puppet-server-2.6.18-0.4.2 as component of SUSE Linux Enterprise Server 11 SP2","product_id":"SUSE Linux Enterprise Server 11 SP2:puppet-server-2.6.18-0.4.2"},"product_reference":"puppet-server-2.6.18-0.4.2","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP2"},{"category":"default_component_of","full_product_name":{"name":"puppet-2.6.18-0.4.2 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP2","product_id":"SUSE Linux Enterprise Server for SAP Applications 11 SP2:puppet-2.6.18-0.4.2"},"product_reference":"puppet-2.6.18-0.4.2","relates_to_product_reference":"SUSE Linux Enterprise Server for SAP Applications 11 SP2"},{"category":"default_component_of","full_product_name":{"name":"puppet-server-2.6.18-0.4.2 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP2","product_id":"SUSE Linux Enterprise Server for SAP Applications 11 SP2:puppet-server-2.6.18-0.4.2"},"product_reference":"puppet-server-2.6.18-0.4.2","relates_to_product_reference":"SUSE Linux Enterprise Server for SAP Applications 11 SP2"}]},"vulnerabilities":[{"cve":"CVE-2013-1640","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2013-1640"}],"notes":[{"category":"general","text":"The (1) template and (2) inline_template functions in the master server in Puppet before 2.6.18, 2.7.x before 2.7.21, and 3.1.x before 3.1.1, and Puppet Enterprise before 1.2.7 and 2.7.x before 2.7.2 allows remote authenticated users to execute arbitrary code via a crafted catalog request.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Desktop 11 SP2:puppet-2.6.18-0.4.2","SUSE Linux Enterprise Server 11 SP1-TERADATA:puppet-2.6.18-0.4.2","SUSE Linux Enterprise Server 11 SP1-TERADATA:puppet-server-2.6.18-0.4.2","SUSE Linux Enterprise Server 11 SP1-TERADATA:pwdutils-3.2.8-0.2.35","SUSE Linux Enterprise Server 11 SP2:puppet-2.6.18-0.4.2","SUSE Linux Enterprise Server 11 SP2:puppet-server-2.6.18-0.4.2","SUSE Linux Enterprise Server for SAP Applications 11 SP2:puppet-2.6.18-0.4.2","SUSE Linux Enterprise Server for SAP Applications 11 SP2:puppet-server-2.6.18-0.4.2"]},"references":[{"category":"external","summary":"CVE-2013-1640","url":"https://www.suse.com/security/cve/CVE-2013-1640"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 809839 for CVE-2013-1640","url":"https://bugzilla.suse.com/809839"},{"category":"external","summary":"SUSE Bug 880224 for CVE-2013-1640","url":"https://bugzilla.suse.com/880224"},{"category":"external","summary":"Advisory link for SUSE-SU-2013:0618-1","url":"https://lists.suse.com/pipermail/sle-security-updates/2013-April/000414.html"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Desktop 11 SP2:puppet-2.6.18-0.4.2","SUSE Linux Enterprise Server 11 SP1-TERADATA:puppet-2.6.18-0.4.2","SUSE Linux Enterprise Server 11 SP1-TERADATA:puppet-server-2.6.18-0.4.2","SUSE Linux Enterprise Server 11 SP1-TERADATA:pwdutils-3.2.8-0.2.35","SUSE Linux Enterprise Server 11 SP2:puppet-2.6.18-0.4.2","SUSE Linux Enterprise Server 11 SP2:puppet-server-2.6.18-0.4.2","SUSE Linux Enterprise Server for SAP Applications 11 SP2:puppet-2.6.18-0.4.2","SUSE Linux Enterprise Server for SAP Applications 11 SP2:puppet-server-2.6.18-0.4.2"]}],"threats":[{"category":"impact","date":"2013-06-28T06:59:50Z","details":"moderate"}],"title":"CVE-2013-1640"}]}