First published: Wed Sep 08 2021(Updated: )
A user who has control of the source, and source_hash URLs can gain full file system access as root on a salt minion.
Credit: security@vmware.com security@vmware.com security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/salt | 2018.3.4+dfsg1-6+deb10u3 3002.6+dfsg1-4+deb11u1 3004.1+dfsg-2.2 | |
SaltStack Salt | <3000.3 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 | |
Fedoraproject Fedora | =35 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
pip/salt | >=0<3003.3 | 3003.3 |
SaltStack Salt |
Update to the latest versions of salt minion code.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21996 is a vulnerability in SaltStack Salt before version 3003.3 that allows a user to gain full file system access as root on a salt minion.
The severity of CVE-2021-21996 is high with a CVSS score of 7.5.
CVE-2021-21996 affects SaltStack Salt versions before 3003.3.
To fix CVE-2021-21996, update SaltStack Salt to version 3003.3 or later.
You can find more information about CVE-2021-21996 at the following references: [1](https://security-tracker.debian.org/tracker/CVE-2021-21996), [2](https://security-tracker.debian.org/tracker/CVE-2021-22004), [3](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21996)