First published: Sat Feb 27 2021(Updated: )
An issue was discovered in through SaltStack Salt before 3002.5. salt-api does not honor eauth credentials for the wheel_async client. Thus, an attacker can remotely run any wheel modules on the master.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SaltStack Salt | <2015.8.10 | |
SaltStack Salt | >=2015.8.11<2015.8.13 | |
SaltStack Salt | >=2016.3.0<2016.3.4 | |
SaltStack Salt | >=2016.3.5<2016.3.6 | |
SaltStack Salt | >=2016.3.7<2016.3.8 | |
SaltStack Salt | >=2016.3.9<2016.11.3 | |
SaltStack Salt | >=2016.11.4<2016.11.5 | |
SaltStack Salt | >=2016.11.7<2016.11.10 | |
SaltStack Salt | >=2017.5.0<2017.7.8 | |
SaltStack Salt | >=2018.2.0<=2018.3.5 | |
SaltStack Salt | >=2019.2.0<2019.2.5 | |
SaltStack Salt | >=2019.2.6<2019.2.8 | |
SaltStack Salt | >=3000<3000.6 | |
SaltStack Salt | >=3001<3001.4 | |
SaltStack Salt | >=3002<3002.5 | |
Fedoraproject Fedora | =32 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
SaltStack Salt | <3002.2<3001.4<3000.6<2019.2.8<2019.2.5<2018.3.5<2017.7.8<2016.11.10<2016.11.6<2016.11.5<2016.11.3<2016.3.8<2016.3.6<2016.3.4<2015.8.13<2015.8.10<3002.5<3001.6<3000.8<3002.5<3001.6<3000.8 | 3002.2 3001.4 3000.6 2019.2.8 2019.2.5 2018.3.5 2017.7.8 2016.11.10 2016.11.6 2016.11.5 2016.11.3 2016.3.8 2016.3.6 2016.3.4 2015.8.13 2015.8.10 3002.5 3001.6 3000.8 3002.5 3001.6 3000.8 |
pip/salt | >=3002<3002.3 | 3002.3 |
pip/salt | >=3001<3001.5 | 3001.5 |
pip/salt | >=3000<3000.7 | 3000.7 |
pip/salt | >=2019.2.0<2019.2.8 | 2019.2.8 |
pip/salt | >=2018.2.0<=2018.3.5 | |
pip/salt | >=2017.5.0<2017.7.8 | 2017.7.8 |
pip/salt | >=2016.11.7<2016.11.10 | 2016.11.10 |
pip/salt | >=2016.3.0<2016.11.5 | 2016.11.5 |
pip/salt | <2015.8.13 | 2015.8.13 |
debian/salt | ||
ubuntu/salt | <2017.7.4+dfsg1-1ubuntu18.04.2+ | 2017.7.4+dfsg1-1ubuntu18.04.2+ |
ubuntu/salt | <2015.8.8+ | 2015.8.8+ |
Update to the latest Salt release, package or patch file
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-25281 is a vulnerability in SaltStack Salt before version 3002.5 that allows remote attackers to run any wheel modules on the master.
CVE-2021-25281 has a severity rating of 9.8, which is considered critical.
CVE-2021-25281 affects SaltStack Salt versions before 3002.5.
To fix CVE-2021-25281, you should upgrade SaltStack Salt to version 3002.5 or later.
You can find more information about CVE-2021-25281 at the following references: [1] [2] [3].