Vulnerability identifier: #VU37571
Vulnerability risk: Medium
CVSSv3.1: 4.3 [CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-20
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Puppet Agent
Server applications /
Conferencing, Collaboration and VoIP solutions
Vendor: Puppet Labs
Description
The vulnerability allows a remote privileged user to manipulate data.
Versions of Puppet Enterprise prior to 2016.4.5 or 2017.2.1 shipped with an MCollective configuration that allowed the package plugin to install or remove arbitrary packages on all managed agents. This release adds default configuration to not allow these actions. Customers who rely on this functionality can change this policy.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Puppet Agent:
External links
http://puppet.com/security/cve/cve-2017-2293
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.