Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-qcr3-hr2f-6557

Опубликовано: 30 мар. 2022
Источник: github
Github: Прошло ревью
CVSS3: 8.8

Описание

SaltStack Salt Permissions Bypass

An issue was discovered in SaltStack Salt in versions before 3002.8, 3003.4, 3004.1. When configured as a Master-of-Masters, with a publisher_acl, if a user configured in the publisher_acl targets any minion connected to the Syndic, the Salt Master incorrectly interpreted no valid targets as valid, allowing configured users to target any of the minions connected to the syndic with their configured commands. This requires a syndic master combined with publisher_acl configured on the Master-of-Masters, allowing users specified in the publisher_acl to bypass permissions, publishing authorized commands to any configured minion.

Пакеты

Наименование

salt

pip
Затронутые версииВерсия исправления

< 3002.8

3002.8

Наименование

salt

pip
Затронутые версииВерсия исправления

>= 3003, < 3003.4

3003.4

Наименование

salt

pip
Затронутые версииВерсия исправления

>= 3004, < 3004.1

3004.1

EPSS

Процентиль: 2%
0.00014
Низкий

8.8 High

CVSS3

Дефекты

CWE-732

Связанные уязвимости

CVSS3: 8.8
ubuntu
почти 4 года назад

An issue was discovered in SaltStack Salt in versions before 3002.8, 3003.4, 3004.1. When configured as a Master-of-Masters, with a publisher_acl, if a user configured in the publisher_acl targets any minion connected to the Syndic, the Salt Master incorrectly interpreted no valid targets as valid, allowing configured users to target any of the minions connected to the syndic with their configured commands. This requires a syndic master combined with publisher_acl configured on the Master-of-Masters, allowing users specified in the publisher_acl to bypass permissions, publishing authorized commands to any configured minion.

CVSS3: 8.8
nvd
почти 4 года назад

An issue was discovered in SaltStack Salt in versions before 3002.8, 3003.4, 3004.1. When configured as a Master-of-Masters, with a publisher_acl, if a user configured in the publisher_acl targets any minion connected to the Syndic, the Salt Master incorrectly interpreted no valid targets as valid, allowing configured users to target any of the minions connected to the syndic with their configured commands. This requires a syndic master combined with publisher_acl configured on the Master-of-Masters, allowing users specified in the publisher_acl to bypass permissions, publishing authorized commands to any configured minion.

CVSS3: 8.8
debian
почти 4 года назад

An issue was discovered in SaltStack Salt in versions before 3002.8, 3 ...

suse-cvrf
почти 4 года назад

Security update for salt

suse-cvrf
почти 4 года назад

Security update for salt

EPSS

Процентиль: 2%
0.00014
Низкий

8.8 High

CVSS3

Дефекты

CWE-732