First published: Fri Apr 23 2021(Updated: )
In SaltStack Salt 2016.9 through 3002.6, a command injection vulnerability exists in the snapper module that allows for local privilege escalation on a minion. The attack requires that a file is created with a pathname that is backed up by snapper, and that the master calls the snapper.diff function (which executes popen unsafely).
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/salt | 2018.3.4+dfsg1-6+deb10u3 3002.6+dfsg1-4+deb11u1 3004.1+dfsg-2.2 | |
SaltStack Salt | >=2016.9<=3002.6 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 | |
Fedoraproject Fedora | =35 | |
debian/salt | <=2018.3.4+dfsg1-6<=2018.3.4+dfsg1-6+deb10u2<=3002.6+dfsg1-1 | |
SaltStack Salt | ||
pip/salt | >=2016.11.0<=3002.6 | 3003rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-31607 is a command injection vulnerability in the snapper module of SaltStack Salt 2016.9 through 3002.6, allowing for local privilege escalation on a minion.
The severity of CVE-2021-31607 is high with a CVSS score of 7.8.
CVE-2021-31607 requires the creation of a file with a backed-up pathname by snapper and the master calling the snapper.diff function, leading to command injection and potential privilege escalation.
SaltStack Salt versions 2016.9 through 3002.6 are affected by CVE-2021-31607.
To fix CVE-2021-31607, update to SaltStack Salt version 2018.3.4+dfsg1-6+deb10u3 or 3002.6+dfsg1-4+deb11u1 or 3004.1+dfsg-2.2, as recommended by Debian.