Vulnerability CVE-2017-2295


Published: 2017-07-05

Description:
Versions of Puppet prior to 4.10.1 will deserialize data off the wire (from the agent to the server, in this case) with a attacker-specified format. This could be used to force YAML deserialization in an unsafe manner, which would lead to remote code execution. This change constrains the format of data on the wire to PSON or safely decoded YAML.

Type:

CWE-502

(Deserialization of Untrusted Data)

CVSS2 => (AV:N/AC:M/Au:S/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6/10
6.4/10
6.8/10
Exploit range
Attack complexity
Authentication
Remote
Medium
Single time
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Puppetlabs -> Puppet 
Puppet -> Puppet 
Debian -> Debian linux 

 References:
http://www.debian.org/security/2017/dsa-3862
http://www.securityfocus.com/bid/98582
https://puppet.com/security/cve/cve-2017-2295

Copyright 2024, cxsecurity.com

 

Back to Top