Arbitrary Code Execution Affecting salt package, versions [,2019.2.4) [3000, 3000.2)
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-PYTHON-SALT-568031
- published 30 Apr 2020
- disclosed 30 Apr 2020
- credit Unknown
Introduced: 30 Apr 2020
CVE-2020-11651 Open this link in a new tabHow to fix?
Upgrade salt
to version 2019.2.4, 3000.2 or higher.
Overview
salt is a new approach to infrastructure management built on a dynamic communication bus. Salt can be used for data-driven orchestration, remote execution for any infrastructure, configuration management for any app stack, and much more.
Affected versions of this package are vulnerable to Arbitrary Code Execution. The salt-master process ClearFuncs
class does not properly validate method calls. This allows a remote user to access some methods without authentication. These methods can be used to retrieve user tokens from the salt master and/or run arbitrary commands on salt minions.