First published: Wed Sep 08 2021(Updated: )
An issue was discovered in SaltStack Salt before 3003.3. The salt minion installer will accept and use a minion config file at C:\salt\conf if that file is in place before the installer is run. This allows for a malicious actor to subvert the proper behaviour of the given minion software.
Credit: security@vmware.com security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/salt | <3003.3 | 3003.3 |
debian/salt | <=2018.3.4+dfsg1-6+deb10u3<=3002.6+dfsg1-4+deb11u1 | 3004.1+dfsg-2.2 |
SaltStack Salt | <3000.3 | |
Microsoft Windows | ||
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 | |
Fedoraproject Fedora | =35 | |
SaltStack Salt | ||
All of | ||
SaltStack Salt | <3000.3 | |
Microsoft Windows |
Use the latest Windows installer (v3001.8+, v3002.7+, or v3003.3+) when deploying the salt minion on Windows.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22004 is a vulnerability in SaltStack Salt before version 3003.3 that allows a malicious actor to subvert the proper behavior of the Salt minion software.
CVE-2021-22004 has a severity rating of 6.4, which is considered medium.
SaltStack Salt versions before 3003.3 are affected by CVE-2021-22004.
To fix CVE-2021-22004, update SaltStack Salt to version 3003.3 or later.
More information about CVE-2021-22004 can be found at the following references: [NVD](https://nvd.nist.gov/vuln/detail/CVE-2021-22004), [Fedora Project](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6BUWUF5VTENNP2ZYZBVFKPSUHLKLUBD5/), [Fedora Project](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ACVT7M4YLZRLWWQ6SGRK3C6TOF4FXOXT/)