First published: Wed Jun 22 2022(Updated: )
An issue was discovered in SaltStack Salt in versions before 3002.9, 3003.5, 3004.2. PAM auth fails to reject locked accounts, which allows a previously authorized user whose account is locked still run Salt commands when their account is locked. This affects both local shell accounts with an active session and salt-api users that authenticate via PAM eauth.
Credit: security@vmware.com security@vmware.com security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/salt | >=3004.0<3004.2 | 3004.2 |
pip/salt | >=3003.0<3003.5 | 3003.5 |
pip/salt | <3002.9 | 3002.9 |
SaltStack Salt | <3002.9 | |
SaltStack Salt | >=3003<3003.5 | |
SaltStack Salt | >=3004<3004.2 | |
SaltStack Salt | ||
<3002.9 | ||
>=3003<3003.5 | ||
>=3004<3004.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-22967 is an issue discovered in SaltStack Salt that allows a previously authorized user with a locked account to still run Salt commands.
Versions before 3002.9, 3003.5, and 3004.2 of SaltStack Salt are affected by CVE-2022-22967.
CVE-2022-22967 has a severity rating of 8.8, indicating a high severity.
CVE-2022-22967 allows users with locked accounts to still run Salt commands, bypassing the account lock.
To fix CVE-2022-22967, users should upgrade to SaltStack Salt versions 3002.9, 3003.5, or 3004.2 or later.