Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-5192

Опубликовано: 20 янв. 2017
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

When using the local_batch client from salt-api in SaltStack Salt before 2015.8.13, 2016.3.x before 2016.3.5, and 2016.11.x before 2016.11.2, external authentication is not respected, enabling all authentication to be bypassed.

Отчет

This issue did not affect the versions of the salt as shipped with Red Hat Ceph Storage 1.3, Red Hat Ceph Storage 2, and Red Hat Storage Console 2 as salt-api and salt-ssh are not shipped with these products.

Меры по смягчению последствий

Disable salt-api for mitigation.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Ceph Storage 1.3saltNot affected
Red Hat Ceph Storage 2saltNot affected
Red Hat Storage Console 2saltNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=1418345salt: local_batch client external authentication not respected

EPSS

Процентиль: 36%
0.00149
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
ubuntu
больше 8 лет назад

When using the local_batch client from salt-api in SaltStack Salt before 2015.8.13, 2016.3.x before 2016.3.5, and 2016.11.x before 2016.11.2, external authentication is not respected, enabling all authentication to be bypassed. The LocalClient.cmd_batch() method client does not accept external_auth credentials and so access to it from salt-api has been removed for now. This vulnerability allows code execution for already-authenticated users and is only in effect when running salt-api as the root user.

CVSS3: 8.8
nvd
больше 8 лет назад

When using the local_batch client from salt-api in SaltStack Salt before 2015.8.13, 2016.3.x before 2016.3.5, and 2016.11.x before 2016.11.2, external authentication is not respected, enabling all authentication to be bypassed.

CVSS3: 8.8
debian
больше 8 лет назад

When using the local_batch client from salt-api in SaltStack Salt befo ...

CVSS3: 8.8
github
больше 3 лет назад

SaltStack Salt Authentication Bypass when using the local_batch client from salt-api

EPSS

Процентиль: 36%
0.00149
Низкий

7.5 High

CVSS3