First published: Wed Aug 16 2017(Updated: )
A flaw in minion id validation was found which could allow certain minions to authenticate to a master despite not having the correct credentials. To exploit the vulnerability, an attacker must create a salt-minion with an ID containing characters that will cause a directory traversal. External References: <a href="https://docs.saltstack.com/en/2016.11/topics/releases/2016.11.7.html">https://docs.saltstack.com/en/2016.11/topics/releases/2016.11.7.html</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SaltStack Salt | <=2016.11.6 | |
SaltStack Salt | =2017.7.0 | |
debian/salt | <=2016.11.5+ds-1<=2014.1.13+ds-1 | 2016.11.8+dfsg1-1 2016.11.2+ds-1+deb9u1 |
redhat/salt | <2016.3.7 | 2016.3.7 |
redhat/salt | <2016.11.7 | 2016.11.7 |
redhat/salt | <2017.7.1 | 2017.7.1 |
pip/salt | >=2017.7.0<2017.7.1 | 2017.7.1 |
pip/salt | <2016.11.7 | 2016.11.7 |
debian/salt |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.