9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.975 High
EPSS
Percentile
100.0%
F-Secure reports:
CVE-2020-11651 - Authentication bypass vulnerabilities
The ClearFuncs class processes unauthenticated requests and
unintentionally exposes the _send_pub() method, which can be used to
queue messages directly on the master publish server. Such messages
can be used to trigger minions to run arbitrary commands as root.
The ClearFuncs class also exposes the method _prep_auth_info(),
which returns the “root key” used to authenticate commands from the
local root user on the master server. This “root key” can then be
used to remotely call administrative commands on the master server.
This unintentional exposure provides a remote un-authenticated
attacker with root-equivalent access to the salt master.
CVE-2020-11652 - Directory traversal vulnerabilities
The wheel module contains commands used to read and write files
under specific directory paths. The inputs to these functions are
concatenated with the target directory and the resulting path is not
canonicalized, leading to an escape of the intended path restriction.
The get_token() method of the salt.tokens.localfs class (which is
exposed to unauthenticated requests by the ClearFuncs class) fails
to sanitize the token input parameter which is then used as a
filename, allowing insertion of “…” path elements and thus reading
of files outside of the intended directory. The only restriction is
that the file has to be deserializable by salt.payload.Serial.loads().
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
FreeBSD | any | noarch | py27-salt | < 2019.2.4 | UNKNOWN |
FreeBSD | any | noarch | py32-salt | < 2019.2.4 | UNKNOWN |
FreeBSD | any | noarch | py33-salt | < 2019.2.4 | UNKNOWN |
FreeBSD | any | noarch | py34-salt | < 2019.2.4 | UNKNOWN |
FreeBSD | any | noarch | py35-salt | < 2019.2.4 | UNKNOWN |
FreeBSD | any | noarch | py36-salt | < 2019.2.4 | UNKNOWN |
FreeBSD | any | noarch | py37-salt | < 2019.2.4 | UNKNOWN |
FreeBSD | any | noarch | py38-salt | < 2019.2.4 | UNKNOWN |
blog.f-secure.com/new-vulnerabilities-make-exposed-salt-hosts-easy-targets/
docs.saltstack.com/en/latest/topics/releases/2019.2.4.html
labs.f-secure.com/advisories/saltstack-authorization-bypass
nvd.nist.gov/vuln/detail/CVE-2020-11651
nvd.nist.gov/vuln/detail/CVE-2020-11652
www.tenable.com/blog/cve-2020-11651-cve-2020-11652-critical-salt-framework-vulnerabilities-exploited-in-the-wild
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.975 High
EPSS
Percentile
100.0%