An issue was discovered in SaltStack Salt before 3002.5. The minion's restartcheck is vulnerable to command injection via a crafted process name. This allows for a local privilege escalation by any user able to create a files on the minion in a non-blacklisted directory.
2021-02-27T05:15:13.630
2024-11-21T05:22:30.490
Modified
CVSSv3.1: 7.8 (HIGH)
AV:L/AC:M/Au:N/C:P/I:P/A:P
3.4
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | saltstack | salt | < 2015.8.10 | Yes |
Application | saltstack | salt | < 2015.8.13 | Yes |
Application | saltstack | salt | < 2016.3.4 | Yes |
Application | saltstack | salt | < 2016.3.6 | Yes |
Application | saltstack | salt | < 2016.3.8 | Yes |
Application | saltstack | salt | < 2016.11.3 | Yes |
Application | saltstack | salt | < 2016.11.5 | Yes |
Application | saltstack | salt | < 2016.11.10 | Yes |
Application | saltstack | salt | < 2017.7.8 | Yes |
Application | saltstack | salt | ≤ 2018.3.5 | Yes |
Application | saltstack | salt | < 2019.2.5 | Yes |
Application | saltstack | salt | < 2019.2.8 | Yes |
Application | saltstack | salt | < 3000.6 | Yes |
Application | saltstack | salt | < 3001.4 | Yes |
Application | saltstack | salt | < 3002.5 | Yes |
Operating System | fedoraproject | fedora | 32 | Yes |
Operating System | fedoraproject | fedora | 33 | Yes |
Operating System | fedoraproject | fedora | 34 | Yes |
Operating System | debian | debian_linux | 9.0 | Yes |
Operating System | debian | debian_linux | 10.0 | Yes |
Operating System | debian | debian_linux | 11.0 | Yes |