First published: Tue Sep 26 2017(Updated: )
When using the local_batch client from salt-api in SaltStack Salt before 2015.8.13, 2016.3.x before 2016.3.5, and 2016.11.x before 2016.11.2, external authentication is not respected, enabling all authentication to be bypassed.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SaltStack Salt | <=2015.8.12 | |
SaltStack Salt | =2016.3.0 | |
SaltStack Salt | =2016.3.1 | |
SaltStack Salt | =2016.3.2 | |
SaltStack Salt | =2016.3.3 | |
SaltStack Salt | =2016.3.4 | |
SaltStack Salt | =2016.11.0 | |
SaltStack Salt | =2016.11.1 | |
SaltStack Salt | =2016.11.2 | |
pip/salt | >=2016.11.0<2016.11.2 | 2016.11.2 |
pip/salt | >=2016.3.0<2016.3.5 | 2016.3.5 |
pip/salt | <2015.8.13 | 2015.8.13 |
<=2015.8.12 | ||
=2016.3.0 | ||
=2016.3.1 | ||
=2016.3.2 | ||
=2016.3.3 | ||
=2016.3.4 | ||
=2016.11.0 | ||
=2016.11.1 | ||
=2016.11.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-5192 is considered a critical vulnerability as it allows authentication bypass in SaltStack Salt.
To fix CVE-2017-5192, upgrade to SaltStack Salt version 2015.8.13, 2016.3.5, or 2016.11.2.
CVE-2017-5192 affects SaltStack Salt versions prior to 2015.8.13, 2016.3.5, and 2016.11.2.
If CVE-2017-5192 is not addressed, unauthorized users may gain control over the SaltStack Salt infrastructure.
Yes, CVE-2017-5192 is specifically related to the lack of respect for external authentication in SaltStack Salt.