Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:puppet:puppet_enterprise:*:*:*:*:*:*:*:*", "matchCriteriaId": "816D363E-4782-4977-9E52-94189E0AEB60", "versionEndIncluding": "3.0.0", "vulnerable": true}, {"criteria": "cpe:2.3:a:puppet:puppet_enterprise:2.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "32A5E42D-9626-4FC8-A032-4CD4FA1255BF", "vulnerable": true}, {"criteria": "cpe:2.3:a:puppet:puppet_enterprise:2.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "06F0697C-A1BF-42FE-A036-F3E6FAB30A87", "vulnerable": true}, {"criteria": "cpe:2.3:a:puppet:puppet_enterprise:2.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "3C43CD3C-ACDB-418B-B67D-9C8EFAC0680C", "vulnerable": true}, {"criteria": "cpe:2.3:a:puppet:puppet_enterprise:2.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "BD8F80AD-1E8E-40BE-883D-6F7F61D4A274", "vulnerable": true}, {"criteria": "cpe:2.3:a:puppet:puppet_enterprise:2.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "9C6E27BB-6444-49E2-8B89-D7E09284D29C", "vulnerable": true}, {"criteria": "cpe:2.3:a:puppet:puppet_enterprise:2.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "43841CE7-ECAC-43FE-935A-478EA413BDF1", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Puppet Enterprise before 3.0.1 does not set the secure flag for the session cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session."}, {"lang": "es", "value": "Puppet Enterprise anterior a 3.0.1, no establece el indicador de seguridad para la cookie de sesi\u00f3n en una del tipo HTTPS, lo que facilita a atacantes remotos la captura de las cookies interceptando la comunicaci\u00f3n en una sesi\u00f3n https."}], "id": "CVE-2013-4964", "lastModified": "2025-04-11T00:51:21.963", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2013-08-20T22:55:04.557", "references": [{"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "http://puppetlabs.com/security/cve/cve-2013-4964/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://puppetlabs.com/security/cve/cve-2013-4964/"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-264"}], "source": "nvd@nist.gov", "type": "Primary"}]}