Versions of MCollective prior to 2.10.4 deserialized YAML from agents without calling safe_load, allowing the potential for arbitrary code execution on the server. The fix for this is to call YAML.safe_load on input. This has been tested in all Puppet-supplied MCollective plugins, but there is a chance that third-party plugins could rely on this insecure behavior.
                
            References
                    | Link | Resource | 
|---|---|
| https://puppet.com/security/cve/cve-2017-2292 | Vendor Advisory | 
| https://security.gentoo.org/glsa/201709-01 | |
| https://puppet.com/security/cve/cve-2017-2292 | Vendor Advisory | 
| https://security.gentoo.org/glsa/201709-01 | 
Configurations
                    History
                    21 Nov 2024, 03:23
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://puppet.com/security/cve/cve-2017-2292 - Vendor Advisory | |
| References | () https://security.gentoo.org/glsa/201709-01 - | 
Information
                Published : 2017-06-30 20:29
Updated : 2025-04-20 01:37
NVD link : CVE-2017-2292
Mitre link : CVE-2017-2292
CVE.ORG link : CVE-2017-2292
JSON object : View
Products Affected
                puppet
- mcollective
 
CWE
                
                    
                        
                        CWE-502
                        
            Deserialization of Untrusted Data
