Incorrect Authorization The advisory has been revoked - it doesn't affect any version of package salt  (opens in a new tab)


Threat Intelligence

EPSS
0.2% (59th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Incorrect Authorization vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-DEBIAN11-SALT-2934962
  • published24 Jun 2022
  • disclosed23 Jun 2022

Introduced: 23 Jun 2022

CVE-2022-22967  (opens in a new tab)
CWE-863  (opens in a new tab)

Amendment

The Debian security team deemed this advisory irrelevant for Debian:11.

NVD Description

Note: Versions mentioned in the description apply only to the upstream salt package and not the salt package as distributed by Debian.

An issue was discovered in SaltStack Salt in versions before 3002.9, 3003.5, 3004.2. PAM auth fails to reject locked accounts, which allows a previously authorized user whose account is locked still run Salt commands when their account is locked. This affects both local shell accounts with an active session and salt-api users that authenticate via PAM eauth.