#VU37571 Input validation error in Puppet Agent


Published: 2018-02-01 | Updated: 2020-08-08

Vulnerability identifier: #VU37571

Vulnerability risk: Medium

CVSSv3.1: 4.3 [CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-2293

CWE-ID: CWE-20

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Puppet Agent
Server applications / Conferencing, Collaboration and VoIP solutions

Vendor: Puppet Labs

Description

The vulnerability allows a remote privileged user to manipulate data.

Versions of Puppet Enterprise prior to 2016.4.5 or 2017.2.1 shipped with an MCollective configuration that allowed the package plugin to install or remove arbitrary packages on all managed agents. This release adds default configuration to not allow these actions. Customers who rely on this functionality can change this policy.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Puppet Agent:


External links
http://puppet.com/security/cve/cve-2017-2293


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability