Show filters
5 Total Results
Displaying 1-5 of 5
Sort by:
Attacker Value
Unknown
CVE-2017-2292
Disclosure Date: June 30, 2017 (last updated November 26, 2024)
Versions of MCollective prior to 2.10.4 deserialized YAML from agents without calling safe_load, allowing the potential for arbitrary code execution on the server. The fix for this is to call YAML.safe_load on input. This has been tested in all Puppet-supplied MCollective plugins, but there is a chance that third-party plugins could rely on this insecure behavior.
0
Attacker Value
Unknown
CVE-2017-2298
Disclosure Date: June 30, 2017 (last updated November 26, 2024)
The mcollective-sshkey-security plugin before 0.5.1 for Puppet uses a server-specified identifier as part of a path where a file is written. A compromised server could use this to write a file to an arbitrary location on the client with the filename appended with the string "_pub.pem".
0
Attacker Value
Unknown
CVE-2017-2290
Disclosure Date: March 03, 2017 (last updated November 26, 2024)
On Windows installations of the mcollective-puppet-agent plugin, version 1.12.0, a non-administrator user can create an executable that will be executed with administrator privileges on the next "mco puppet" run. Puppet Enterprise users are not affected. This is resolved in mcollective-puppet-agent 1.12.1.
0
Attacker Value
Unknown
CVE-2015-7331
Disclosure Date: January 30, 2017 (last updated November 25, 2024)
The mcollective-puppet-agent plugin before 1.11.1 for Puppet allows remote attackers to execute arbitrary code via vectors involving the --server argument.
0
Attacker Value
Unknown
CVE-2014-3251
Disclosure Date: August 12, 2014 (last updated October 05, 2023)
The MCollective aes_security plugin, as used in Puppet Enterprise before 3.3.0 and Mcollective before 2.5.3, does not properly validate new server certificates based on the CA certificate, which allows local users to establish unauthorized Mcollective connections via unspecified vectors related to a race condition.
0