First published: Thu Apr 30 2020(Updated: )
An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2. The salt-master process ClearFuncs class does not properly validate method calls. This allows a remote user to access some methods without authentication. These methods can be used to retrieve user tokens from the salt master and/or run arbitrary commands on salt minions.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/salt | <=2016.11.2+ds-1+deb9u2<=2014.1.13+ds-3<=2018.3.4+dfsg1-6 | 3000.2+dfsg1-1 2016.11.2+ds-1+deb9u4 2018.3.4+dfsg1-6+deb10u1 2016.11.2+ds-1+deb9u3 |
pip/salt | >=3000<3000.2 | 3000.2 |
pip/salt | <2019.2.4 | 2019.2.4 |
SaltStack Salt | <2019.2.4 | |
SaltStack Salt | >=3000<3000.2 | |
openSUSE Leap | =15.1 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Vmware Application Remote Collector | =7.5.0 | |
Vmware Application Remote Collector | =8.0.0 | |
debian/salt | ||
SaltStack Salt |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-11651 is a vulnerability found in SaltStack Salt that allows for an authentication bypass.
CVE-2020-11651 has a severity rating of 9.8, which is considered critical.
CVE-2020-11651 affects the salt-master process ClearFuncs in SaltStack Salt.
A remote user can exploit CVE-2020-11651 to access some methods without authentication, potentially retrieving user tokens.
Remedies for CVE-2020-11651 are available in the affected software, such as SaltStack Salt versions 3000.2+dfsg1-1 and 2016.11.2+ds-1+deb9u4.