Show plain JSON{"id": "CVE-2013-4958", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 6.9, "accessVector": "LOCAL", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "MEDIUM", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 10.0, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 3.4, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2013-08-20T22:55:04.423", "references": [{"url": "http://puppetlabs.com/security/cve/cve-2013-4958/", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://puppetlabs.com/security/cve/cve-2013-4958/", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-287"}]}], "descriptions": [{"lang": "en", "value": "Puppet Enterprise before 3.0.1 does not use a session timeout, which makes it easier for attackers to gain privileges by leveraging an unattended workstation."}, {"lang": "es", "value": "Puppet Enterprise anterior a 3.0.1, no utiliza un timeout para las sesiones, lo que facilita a atacantes la obtenci\u00f3n de privilegios aprovechando un PC desatendido f\u00edsicamente."}], "lastModified": "2025-04-11T00:51:21.963", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:puppet:puppet_enterprise:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "816D363E-4782-4977-9E52-94189E0AEB60", "versionEndIncluding": "3.0.0"}, {"criteria": "cpe:2.3:a:puppet:puppet_enterprise:2.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "32A5E42D-9626-4FC8-A032-4CD4FA1255BF"}, {"criteria": "cpe:2.3:a:puppet:puppet_enterprise:2.5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "06F0697C-A1BF-42FE-A036-F3E6FAB30A87"}, {"criteria": "cpe:2.3:a:puppet:puppet_enterprise:2.8.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3C43CD3C-ACDB-418B-B67D-9C8EFAC0680C"}, {"criteria": "cpe:2.3:a:puppet:puppet_enterprise:2.8.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BD8F80AD-1E8E-40BE-883D-6F7F61D4A274"}, {"criteria": "cpe:2.3:a:puppet:puppet_enterprise:2.8.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9C6E27BB-6444-49E2-8B89-D7E09284D29C"}, {"criteria": "cpe:2.3:a:puppet:puppet_enterprise:2.8.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "43841CE7-ECAC-43FE-935A-478EA413BDF1"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}