First published: Tue Mar 29 2022(Updated: )
An issue was discovered in SaltStack Salt in versions before 3002.8, 3003.4, 3004.1. When configured as a Master-of-Masters, with a publisher_acl, if a user configured in the publisher_acl targets any minion connected to the Syndic, the Salt Master incorrectly interpreted no valid targets as valid, allowing configured users to target any of the minions connected to the syndic with their configured commands. This requires a syndic master combined with publisher_acl configured on the Master-of-Masters, allowing users specified in the publisher_acl to bypass permissions, publishing authorized commands to any configured minion.
Credit: security@vmware.com security@vmware.com security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
SaltStack Salt | >=3002<3002.8 | |
SaltStack Salt | >=3003<3003.4 | |
SaltStack Salt | >=3004<3004.1 | |
SaltStack Salt | <3004.1<3003.4<3002.8 | 3004.1 3003.4 3002.8 |
pip/salt | <3002.8 | 3002.8 |
pip/salt | >=3004<3004.1 | 3004.1 |
pip/salt | >=3003<3003.4 | 3003.4 |
Solution: The code has been modified to correctly treat an empty list of targets as completely invalid, and the user will correctly be given an error message. How to Mitigate: Upgrade the Salt Master-of-Masters to the latest version of salt software.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-22941 is a vulnerability found in SaltStack Salt before version 3002.8, 3003.4, and 3004.1 that allows an attacker to target minions connected to the Syndic when configured as a Master-of-Masters with a publisher_acl.
CVE-2022-22941 has a severity level of 8.8 (high).
To fix CVE-2022-22941, upgrade SaltStack Salt to version 3002.8, 3003.4, or 3004.1.
You can find more information about CVE-2022-22941 on the SaltStack Salt GitHub releases page, SaltStack repository, and SaltStack security advisory release page.
CWE-732 is a specific weakness category that refers to incorrect interpretation of a security-sensitive feature or behavior.