Critical severity9.0NVD Advisory· Published Jun 30, 2017· Updated May 13, 2026
CVE-2017-2292
CVE-2017-2292
Description
Versions of MCollective prior to 2.10.4 deserialized YAML from agents without calling safe_load, allowing the potential for arbitrary code execution on the server. The fix for this is to call YAML.safe_load on input. This has been tested in all Puppet-supplied MCollective plugins, but there is a chance that third-party plugins could rely on this insecure behavior.
Affected products
2- Puppet/mcollective, Puppet, Puppet Enterprisev5Range: Puppet Enterprise prior to 2016.4.5, Puppet Enterprise 2016.5.x, Puppet Enterprise 2017.1.x, Puppet Agent prior to 1.10.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- puppet.com/security/cve/cve-2017-2292nvdVendor Advisory
- security.gentoo.org/glsa/201709-01nvd
News mentions
0No linked articles in our index yet.