SB2013110505 - Multiple vulnerabilities in SaltStack Salt
Published: November 5, 2013 Updated: August 10, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2013-6617)
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
The salt master in Salt (aka SaltStack) 0.11.0 through 0.17.0 does not properly drop group privileges, which makes it easier for remote attackers to gain privileges.
2) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2013-4439)
The vulnerability allows a remote #AU# to read and manipulate data.
Salt (aka SaltStack) before 0.15.0 through 0.17.0 allows remote authenticated minions to impersonate arbitrary minions via a crafted minion with a valid key.
3) Improper Authentication (CVE-ID: CVE-2013-4435)
The vulnerability allows a remote #AU# to read and manipulate data.
Salt (aka SaltStack) 0.15.0 through 0.17.0 allows remote authenticated users who are using external authentication or client ACL to execute restricted routines by embedding the routine in another routine.
4) Input validation error (CVE-ID: CVE-2013-4436)
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
The default configuration for salt-ssh in Salt (aka SaltStack) 0.17.0 does not validate the SSH host key of requests, which allows remote attackers to have unspecified impact via a man-in-the-middle (MITM) attack.
5) Input validation error (CVE-ID: CVE-2013-4437)
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
Unspecified vulnerability in salt-ssh in Salt (aka SaltStack) 0.17.0 has unspecified impact and vectors related to "insecure Usage of /tmp."
Remediation
Install update from vendor's website.