#VU39104 Information disclosure in Salt


Published: 2017-04-25 | Updated: 2020-08-08

Vulnerability identifier: #VU39104

Vulnerability risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-8109

CWE-ID: CWE-200

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Salt
Web applications / Remote management & hosting panels

Vendor: SaltStack

Description

The vulnerability allows a local authenticated user to execute arbitrary code.

The salt-ssh minion code in SaltStack Salt 2016.11 before 2016.11.4 copied over configuration from the Salt Master without adjusting permissions, which might leak credentials to local attackers on configured minions (clients).

Mitigation
Install update from vendor's website.

Vulnerable software versions

Salt: 2016.11 - 2016.11.3


External links
http://www.securityfocus.com/bid/98095
http://bugzilla.suse.com/show_bug.cgi?id=1035912
http://docs.saltstack.com/en/latest/topics/releases/2016.11.4.html
http://github.com/saltstack/salt/issues/40075
http://github.com/saltstack/salt/pull/40609
http://github.com/saltstack/salt/pull/40609/commits/6e34c2b5e5e849302af7ccd00509929c3809c658


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability