First published: Thu Nov 14 2024(Updated: )
The Salt-SSH pre-flight option copies the script to the target at a predictable path, which allows an attacker to force Salt-SSH to run their script.
Credit: security@vmware.com security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
SaltStack Salt | <3005.4<3006.4 | 3005.4 3006.4 |
pip/salt | >=3006.0rc1<3006.4 | 3006.4 |
pip/salt | <3005.4 | 3005.4 |
How to Mitigate:Upgrade Salt masters to 3005.4 or 3006.4
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-34049 has a high severity level due to the potential for an attacker to run arbitrary scripts on the target system.
To fix CVE-2023-34049, upgrade Salt to version 3005.4 or 3006.4, as these versions contain the necessary security patch.
CVE-2023-34049 allows attackers to execute their scripts on compromised systems, which can lead to unauthorized access or data manipulation.
CVE-2023-34049 affects Salt versions up to and including 3005.4 and 3006.4.
Yes, CVE-2023-34049 is exploitable remotely if the Salt-SSH pre-flight option is enabled.