First published: Tue Apr 25 2017(Updated: )
The salt-ssh minion code in SaltStack Salt 2016.11 before 2016.11.4 copied over configuration from the Salt Master without adjusting permissions, which might leak credentials to local attackers on configured minions (clients).
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SaltStack Salt | =2016.11 | |
SaltStack Salt | =2016.11.0 | |
SaltStack Salt | =2016.11.0-rc1 | |
SaltStack Salt | =2016.11.0-rc2 | |
SaltStack Salt | =2016.11.1 | |
SaltStack Salt | =2016.11.2 | |
SaltStack Salt | =2016.11.3 | |
pip/salt | >=2016.11<2016.11.4 | 2016.11.4 |
=2016.11 | ||
=2016.11.0 | ||
=2016.11.0-rc1 | ||
=2016.11.0-rc2 | ||
=2016.11.1 | ||
=2016.11.2 | ||
=2016.11.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-8109 is classified as a moderate severity vulnerability due to potential credential leakage.
To fix CVE-2017-8109, upgrade SaltStack Salt to version 2016.11.4 or later.
CVE-2017-8109 affects SaltStack Salt versions 2016.11 through 2016.11.3.
CVE-2017-8109 is a configuration permission issue that can expose sensitive credentials.
No, CVE-2017-8109 requires local access to the affected systems to exploit the vulnerability.