First published: Thu Apr 30 2020(Updated: )
An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2. The salt-master process ClearFuncs class allows access to some methods that improperly sanitize paths. These methods allow arbitrary directory access to authenticated users.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/salt | >=3000<3000.2 | 3000.2 |
pip/salt | <2019.2.4 | 2019.2.4 |
SaltStack Salt | <2019.2.4 | |
SaltStack Salt | >=3000<3000.2 | |
openSUSE Leap | =15.1 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
BlackBerry Workspaces Server | <=7.1.3 | |
BlackBerry Workspaces Server | >=8.0.0<=8.2.6 | |
BlackBerry Workspaces Server | =9.1.0 | |
Vmware Application Remote Collector | =7.5.0 | |
Vmware Application Remote Collector | =8.0.0 | |
debian/salt | ||
SaltStack Salt |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-11652 is a path traversal vulnerability in the salt-master process ClearFuncs which allows directory access to authenticated users.
The vulnerability affects Salt users who have authenticated access to the salt-master process ClearFuncs.
CVE-2020-11652 has a severity rating of medium with a severity value of 6.5.
SaltStack Salt versions up to 2019.2.4 and 3000.2 are affected, as well as specific versions of Ubuntu, Debian, openSUSE Leap, Canonical Ubuntu Linux, BlackBerry Workspaces Server, and VMware Application Remote Collector.
To fix the vulnerability, you should upgrade SaltStack Salt to version 2019.2.4 or higher, or apply the necessary patches for the affected software versions.