Versions of Puppet prior to 4.10.1 will deserialize data off the wire (from the agent to the server, in this case) with a attacker-specified format. This could be used to force YAML deserialization in an unsafe manner, which would lead to remote code execution. This change constrains the format of data on the wire to PSON or safely decoded YAML.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1012-1 | puppet security update |
Debian DSA |
DSA-3862-1 | puppet security update |
EUVD |
EUVD-2017-11478 | Versions of Puppet prior to 4.10.1 will deserialize data off the wire (from the agent to the server, in this case) with a attacker-specified format. This could be used to force YAML deserialization in an unsafe manner, which would lead to remote code execution. This change constrains the format of data on the wire to PSON or safely decoded YAML. |
Ubuntu USN |
USN-3308-1 | Puppet vulnerabilities |
Ubuntu USN |
USN-4804-1 | Puppet vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: puppet
Published:
Updated: 2024-09-16T20:43:40.186Z
Reserved: 2016-12-01T00:00:00
Link: CVE-2017-2295
No data.
Status : Deferred
Published: 2017-07-05T15:29:00.207
Modified: 2025-04-20T01:37:25.860
Link: CVE-2017-2295
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
EUVD
Ubuntu USN