Vulnerability Description
Versions of MCollective prior to 2.10.4 deserialized YAML from agents without calling safe_load, allowing the potential for arbitrary code execution on the server. The fix for this is to call YAML.safe_load on input. This has been tested in all Puppet-supplied MCollective plugins, but there is a chance that third-party plugins could rely on this insecure behavior.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Puppet | Mcollective | <= 2.10.3 |
Related Weaknesses (CWE)
References
- https://puppet.com/security/cve/cve-2017-2292Vendor Advisory
- https://security.gentoo.org/glsa/201709-01
- https://puppet.com/security/cve/cve-2017-2292Vendor Advisory
- https://security.gentoo.org/glsa/201709-01
FAQ
What is CVE-2017-2292?
CVE-2017-2292 is a vulnerability with a CVSS score of 9.0 (CRITICAL). Versions of MCollective prior to 2.10.4 deserialized YAML from agents without calling safe_load, allowing the potential for arbitrary code execution on the server. The fix for this is to call YAML.saf...
How severe is CVE-2017-2292?
CVE-2017-2292 has been rated CRITICAL with a CVSS base score of 9.0/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2017-2292?
Check the references section above for vendor advisories and patch information. Affected products include: Puppet Mcollective.