First published: Thu Apr 30 2020(Updated: )
An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2. The salt-master process ClearFuncs class allows access to some methods that improperly sanitize paths. These methods allow arbitrary directory access to authenticated users.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/salt | ||
pip/salt | >=3000<3000.2 | 3000.2 |
pip/salt | <2019.2.4 | 2019.2.4 |
SaltStack | <2019.2.4 | |
SaltStack | >=3000<3000.2 | |
SUSE Linux | =15.1 | |
Debian | =8.0 | |
Debian | =9.0 | |
Debian | =10.0 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
BlackBerry Workspaces | <=7.1.3 | |
BlackBerry Workspaces | >=8.0.0<=8.2.6 | |
BlackBerry Workspaces | =9.1.0 | |
vmware application remote collector | =7.5.0 | |
vmware application remote collector | =8.0.0 | |
SaltStack |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-11652 is a path traversal vulnerability in the salt-master process ClearFuncs which allows directory access to authenticated users.
The vulnerability affects Salt users who have authenticated access to the salt-master process ClearFuncs.
CVE-2020-11652 has a severity rating of medium with a severity value of 6.5.
SaltStack Salt versions up to 2019.2.4 and 3000.2 are affected, as well as specific versions of Ubuntu, Debian, openSUSE Leap, Canonical Ubuntu Linux, BlackBerry Workspaces Server, and VMware Application Remote Collector.
To fix the vulnerability, you should upgrade SaltStack Salt to version 2019.2.4 or higher, or apply the necessary patches for the affected software versions.