Access Restriction Bypass Affecting salt package, versions <0.17.1+dfsg-1


Severity

Recommended
0.0
critical
0
10

Snyk's Security Team recommends NVD's CVSS assessment

    Threat Intelligence

    EPSS
    0.48% (76th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-DEBIAN10-SALT-292700
  • published 5 Nov 2013
  • disclosed 5 Nov 2013

How to fix?

Upgrade Debian:10 salt to version 0.17.1+dfsg-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream salt package and not the salt package as distributed by Debian. See How to fix? for Debian:10 relevant fixed versions and status.

The salt master in Salt (aka SaltStack) 0.11.0 through 0.17.0 does not properly drop group privileges, which makes it easier for remote attackers to gain privileges.

CVSS Scores

version 3.1
Expand this section

NVD

9.8 critical
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    Low
  • Privileges Required (PR)
    None
  • User Interaction (UI)
    None
  • Scope (S)
    Unchanged
  • Confidentiality (C)
    High
  • Integrity (I)
    High
  • Availability (A)
    High