Description
Versions of MCollective prior to 2.10.4 deserialized YAML from agents without calling safe_load, allowing the potential for arbitrary code execution on the server. The fix for this is to call YAML.safe_load on input. This has been tested in all Puppet-supplied MCollective plugins, but there is a chance that third-party plugins could rely on this insecure behavior.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2017-11475 | Versions of MCollective prior to 2.10.4 deserialized YAML from agents without calling safe_load, allowing the potential for arbitrary code execution on the server. The fix for this is to call YAML.safe_load on input. This has been tested in all Puppet-supplied MCollective plugins, but there is a chance that third-party plugins could rely on this insecure behavior. |
References
History
No history.
Status: PUBLISHED
Assigner: puppet
Published:
Updated: 2024-09-16T23:52:02.685Z
Reserved: 2016-12-01T00:00:00.000Z
Link: CVE-2017-2292
No data.
Status : Modified
Published: 2017-06-30T20:29:00.170
Modified: 2026-05-13T00:24:29.033
Link: CVE-2017-2292
OpenCVE Enrichment
No data.
Weaknesses
EUVD