First published: Thu Sep 17 2020(Updated: )
A Improper Access Control vulnerability in the configuration of salt of SUSE Linux Enterprise Module for SUSE Manager Server 4.1, SUSE Manager Proxy 4.0, SUSE Manager Retail Branch Server 4.0, SUSE Manager Server 3.2, SUSE Manager Server 4.0 allows local users to escalate to root on every system managed by SUSE manager. On the managing node itself code can be executed as user salt, potentially allowing for escalation to root there. This issue affects: SUSE Linux Enterprise Module for SUSE Manager Server 4.1 google-gson versions prior to 2.8.5-3.4.3, httpcomponents-client-4.5.6-3.4.2, httpcomponents-. SUSE Manager Proxy 4.0 release-notes-susemanager-proxy versions prior to 4.0.9-0.16.38.1. SUSE Manager Retail Branch Server 4.0 release-notes-susemanager-proxy versions prior to 4.0.9-0.16.38.1. SUSE Manager Server 3.2 salt-netapi-client versions prior to 0.16.0-4.14.1, spacewalk-. SUSE Manager Server 4.0 release-notes-susemanager versions prior to 4.0.9-3.54.1.
Credit: meissner@suse.de
Affected Software | Affected Version | How to fix |
---|---|---|
Suse Salt-netapi-client | <0.17.0-3.3.2 | |
SUSE Manager Server | =4.1 | |
Suse Salt-netapi-client | <0.16.0-4.14.1 | |
SUSE Manager Server | =3.2 | |
Suse Salt-netapi-client | <0.17.0-4.6.3 | |
SUSE Manager Server | =4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-8028 is a vulnerability in the configuration of salt of SUSE Linux Enterprise Module for SUSE Manager Server, SUSE Manager Proxy, SUSE Manager Retail Branch Server that allows local users to escalate to root on every system managed by Salt.
CVE-2020-8028 has a severity rating of 9.3 (Critical).
CVE-2020-8028 affects SUSE Salt-netapi-client versions 0.17.0-3.3.2, 0.16.0-4.14.1, and 0.17.0-4.6.3, as well as SUSE Manager Server versions 4.1, 4.0, and 3.2.
To fix CVE-2020-8028, it is recommended to update to the latest version of SUSE Salt-netapi-client and SUSE Manager Server that have the vulnerability patched.
More information about CVE-2020-8028 can be found at the following reference: https://bugzilla.suse.com/show_bug.cgi?id=1175884