First published: Sat Feb 27 2021(Updated: )
In SaltStack Salt before 3002.5, eauth tokens can be used once after expiration. (They might be used to run command against the salt master or minions.)
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/salt | 2018.3.4+dfsg1-6+deb10u3 3002.6+dfsg1-4+deb11u1 3004.1+dfsg-2.2 | |
SaltStack Salt | <2015.8.10 | |
SaltStack Salt | >=2015.8.11<2015.8.13 | |
SaltStack Salt | >=2016.3.0<2016.3.4 | |
SaltStack Salt | >=2016.3.5<2016.3.6 | |
SaltStack Salt | >=2016.3.7<2016.3.8 | |
SaltStack Salt | >=2016.3.9<2016.11.3 | |
SaltStack Salt | >=2016.11.4<2016.11.5 | |
SaltStack Salt | >=2016.11.7<2016.11.10 | |
SaltStack Salt | >=2017.5.0<2017.7.8 | |
SaltStack Salt | >=2018.2.0<=2018.3.5 | |
SaltStack Salt | >=2019.2.0<2019.2.5 | |
SaltStack Salt | >=2019.2.6<2019.2.8 | |
SaltStack Salt | >=3000<3000.6 | |
SaltStack Salt | >=3001<3001.4 | |
SaltStack Salt | >=3002<3002.5 | |
Fedoraproject Fedora | =32 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
SaltStack Salt | <3002.2<3001.4<3000.6<2019.2.8<2019.2.5<2018.3.5<2017.7.8<2016.11.10<2016.11.6<2016.11.5<2016.11.3<2016.3.8<2016.3.6<2016.3.4<2015.8.13<2015.8.10<3002.5<3001.6<3000.8<3002.5<3001.6<3000.8 | 3002.2 3001.4 3000.6 2019.2.8 2019.2.5 2018.3.5 2017.7.8 2016.11.10 2016.11.6 2016.11.5 2016.11.3 2016.3.8 2016.3.6 2016.3.4 2015.8.13 2015.8.10 3002.5 3001.6 3000.8 3002.5 3001.6 3000.8 |
pip/salt | >=2019.2.0<2019.2.8 | 2019.2.8 |
pip/salt | >=3002<3002.3 | 3002.3 |
pip/salt | >=3001<3001.5 | 3001.5 |
pip/salt | >=3000<3000.7 | 3000.7 |
pip/salt | >=2018.2.0<=2018.3.5 | |
pip/salt | >=2017.5.0<2017.7.8 | 2017.7.8 |
pip/salt | >=2016.11.7<2016.11.10 | 2016.11.10 |
pip/salt | >=2016.3.0<2016.11.5 | 2016.11.5 |
pip/salt | <2015.8.13 | 2015.8.13 |
Update to the latest Salt release, package or patch file
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this SaltStack vulnerability is CVE-2021-3144.
The severity of CVE-2021-3144 is critical.
The affected software for CVE-2021-3144 is SaltStack Salt before 3002.5.
This vulnerability can be exploited by using eauth tokens that can be used once after expiration to run commands against the salt master or minions.
Yes, a fix for CVE-2021-3144 is available. It is recommended to update to version 3002.5 or later of SaltStack Salt.