Vulnerability identifier: #VU39104
Vulnerability risk: Low
CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-200
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Salt
Web applications /
Remote management & hosting panels
Vendor: SaltStack
Description
The vulnerability allows a local authenticated user to execute arbitrary code.
The salt-ssh minion code in SaltStack Salt 2016.11 before 2016.11.4 copied over configuration from the Salt Master without adjusting permissions, which might leak credentials to local attackers on configured minions (clients).
Mitigation
Install update from vendor's website.
Vulnerable software versions
Salt: 2016.11 - 2016.11.3
External links
http://www.securityfocus.com/bid/98095
http://bugzilla.suse.com/show_bug.cgi?id=1035912
http://docs.saltstack.com/en/latest/topics/releases/2016.11.4.html
http://github.com/saltstack/salt/issues/40075
http://github.com/saltstack/salt/pull/40609
http://github.com/saltstack/salt/pull/40609/commits/6e34c2b5e5e849302af7ccd00509929c3809c658
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.