First published: Thu Jul 18 2019(Updated: )
SaltStack Salt 2018.3 is affected by: SQL Injection. The impact is: An attacker could escalate privileges on MySQL server deployed by cloud provider. It leads to RCE. The component is: The `mysql.user_chpass` function from the MySQL module for Salt (https://github.com/saltstack/salt/blob/develop/salt/modules/mysql.py#L1462). The attack vector is: specially crafted password string. The fixed version is: 2018.3.4.
Credit: josh@bress.net josh@bress.net
Affected Software | Affected Version | How to fix |
---|---|---|
debian/salt | 2018.3.4+dfsg1-6+deb10u3 3002.6+dfsg1-4+deb11u1 3004.1+dfsg-2.2 | |
SaltStack Salt 2018 | =3.0 | |
Saltstack Salt 2019 | =2.0 | |
pip/salt | >=2018.3.0<2018.3.4 | 2018.3.4 |
=3.0 | ||
=2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1010259 is a vulnerability in SaltStack Salt 2018.3 and 2019.2 that allows for SQL injection, leading to privilege escalation and remote code execution.
CVE-2019-1010259 is considered to be a critical vulnerability with a severity score of 9.8.
The impact of CVE-2019-1010259 is that an attacker could escalate privileges on a MySQL server deployed by a cloud provider, leading to remote code execution.
The mysql.user_chpass function from the MySQL module for Salt is the component affected by CVE-2019-1010259.
To fix CVE-2019-1010259, you should upgrade to the following versions: SaltStack Salt 2018.3.4+dfsg1-6+deb10u3, SaltStack Salt 3002.6+dfsg1-4+deb11u1, or SaltStack Salt 3004.1+dfsg-2.2.