Improper Input Validation Affecting salt package, versions <2018.3.4+dfsg1-6+deb10u1
Threat Intelligence
Exploit Maturity
Mature
EPSS
97.25% (100th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN10-SALT-567952
- published 30 Apr 2020
- disclosed 30 Apr 2020
Introduced: 30 Apr 2020
CVE-2020-11652 Open this link in a new tabHow to fix?
Upgrade Debian:10 salt to version 2018.3.4+dfsg1-6+deb10u1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream salt package and not the salt package as distributed by Debian.
See How to fix? for Debian:10 relevant fixed versions and status.
An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2. The salt-master process ClearFuncs class allows access to some methods that improperly sanitize paths. These methods allow arbitrary directory access to authenticated users.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2020-11652
- https://security-tracker.debian.org/tracker/CVE-2020-11652
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-salt-2vx545AG
- https://www.debian.org/security/2020/dsa-4676
- https://github.com/saltstack/salt/blob/v3000.2_docs/doc/topics/releases/3000.2.rst
- http://packetstormsecurity.com/files/157560/Saltstack-3000.1-Remote-Code-Execution.html
- http://packetstormsecurity.com/files/157678/SaltStack-Salt-Master-Minion-Unauthenticated-Remote-Code-Execution.html
- https://docs.saltstack.com/en/latest/topics/releases/2019.2.4.html
- http://support.blackberry.com/kb/articleDetail?articleNumber=000063758
- https://lists.debian.org/debian-lts-announce/2020/05/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00047.html
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00070.html
- https://usn.ubuntu.com/4459-1/
- http://www.vmware.com/security/advisories/VMSA-2020-0009.html
- https://www.exploit-db.com/exploits/48421
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog
CVSS Scores
version 3.1