Versions of Puppet prior to 4.10.1 will deserialize data off the wire (from the agent to the server, in this case) with a attacker-specified format. This could be used to force YAML deserialization in an unsafe manner, which would lead to remote code execution. This change constrains the format of data on the wire to PSON or safely decoded YAML.
The MITRE CVE dictionary describes this issue as:
Find out more about CVE-2017-2295 from the MITRE CVE dictionary dictionary and NIST NVD.
CVSS3 Base Score | 8.1 |
---|---|
CVSS3 Base Metrics | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
Attack Vector | Network |
Attack Complexity | High |
Privileges Required | None |
User Interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity Impact | High |
Availability Impact | High |
Platform | Errata | Release Date |
---|---|---|
Red Hat Satellite 6.3 | RHSA-2018:0336 | 2018-02-21 |
Red Hat Satellite Capsule 6.3 | RHSA-2018:0336 | 2018-02-21 |
Platform | Package | State |
---|---|---|
Red Hat Subscription Asset Manager 1 | puppet | Will not fix |
Red Hat Satellite 6 | puppet | Affected |
Red Hat OpenStack Platform 9.0 | puppet | Will not fix |
Red Hat OpenStack Platform 8.0 (Liberty) | puppet | Will not fix |
Red Hat OpenStack Platform 12.0 | puppet | Will not fix |
Red Hat OpenStack Platform 11.0 (Ocata) | puppet | Will not fix |
Red Hat OpenStack Platform 10 | puppet | Will not fix |
Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7 | puppet | Will not fix |
Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7 | puppet | Will not fix |
Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) | puppet | Will not fix |
Red Hat Ceph Storage 1.3 | puppet | Will not fix |
OpenStack 6 Installer for RHEL 7 | puppet | Will not fix |