Description
Versions of MCollective prior to 2.10.4 deserialized YAML from agents without calling safe_load, allowing the potential for arbitrary code execution on the server. The fix for this is to call YAML.safe_load on input. This has been tested in all Puppet-supplied MCollective plugins, but there is a chance that third-party plugins could rely on this insecure behavior.
CVSS vector
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:LExploitability: 2.3 | Impact: 6.0Attack Vector: Network
Complexity: Low
Privileges: High
User Interaction: None
Scope: Changed
Confidentiality: High
Integrity: High
Availability: Low
Affected Packages2 packages
🔴Vulnerability Details
3GHSAGHSA-9hgj-f7f3-cph7: Versions of MCollective prior to 2↗2022-05-17 ▶ OSVCVE-2017-2292: Versions of MCollective prior to 2↗2017-06-30 ▶ CVEListCVE-2017-2292: Versions of MCollective prior to 2↗2017-06-30 ▶ 💥Exploits & PoCs
1Exploit-DBPyroBatchFTP 3.17 - Buffer Overflow (SEH)↗2017-10-07 ▶ 📋Vendor Advisories
2Red Hatmcollective: RCE via YAML deserialization↗2017-05-11 ▶ DebianCVE-2017-2292: mcollective - Versions of MCollective prior to 2.10.4 deserialized YAML from agents without ca...↗2017 ▶ 💬Community
4BugzillaCVE-2017-2292 mcollective: RCE via YAML deserialization↗2017-07-12 ▶ BugzillaCVE-2017-2292 mcollective: RCE via YAML deserialization [epel-6]↗2017-07-12 ▶ BugzillaCVE-2017-2292 mcollective: RCE via YAML deserialization [fedora-all]↗2017-07-12 ▶ BugzillaCVE-2017-7507 gnutls: Crash upon receiving well-formed status_request extension↗2017-05-23 ▶