Lucene search

K
freebsdFreeBSD6BF55AF9-973B-11EA-9F2C-38D547003487
HistoryApr 30, 2020 - 12:00 a.m.

salt -- multiple vulnerabilities in salt-master process

2020-04-3000:00:00
vuxml.freebsd.org
15

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.975 High

EPSS

Percentile

100.0%

F-Secure reports:

CVE-2020-11651 - Authentication bypass vulnerabilities
The ClearFuncs class processes unauthenticated requests and
unintentionally exposes the _send_pub() method, which can be used to
queue messages directly on the master publish server. Such messages
can be used to trigger minions to run arbitrary commands as root.
The ClearFuncs class also exposes the method _prep_auth_info(),
which returns the “root key” used to authenticate commands from the
local root user on the master server. This “root key” can then be
used to remotely call administrative commands on the master server.
This unintentional exposure provides a remote un-authenticated
attacker with root-equivalent access to the salt master.

CVE-2020-11652 - Directory traversal vulnerabilities
The wheel module contains commands used to read and write files
under specific directory paths. The inputs to these functions are
concatenated with the target directory and the resulting path is not
canonicalized, leading to an escape of the intended path restriction.
The get_token() method of the salt.tokens.localfs class (which is
exposed to unauthenticated requests by the ClearFuncs class) fails
to sanitize the token input parameter which is then used as a
filename, allowing insertion of “…” path elements and thus reading
of files outside of the intended directory. The only restriction is
that the file has to be deserializable by salt.payload.Serial.loads().

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.975 High

EPSS

Percentile

100.0%