Severity
7.8HIGH
EPSS
1.7%
top 17.54%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 27
Latest updateAug 8

Description

An issue was discovered in SaltStack Salt before 3002.5. The minion's restartcheck is vulnerable to command injection via a crafted process name. This allows for a local privilege escalation by any user able to create a files on the minion in a non-blacklisted directory.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages2 packages

NVDsaltstack/salt2015.8.112015.8.13+14
PyPIsalt2015.8.112015.8.13+22

Also affects: Debian Linux 10.0, 11.0, 9.0, Fedora 32, 33, 34

🔴Vulnerability Details

5
OSV
salt vulnerabilities2024-08-08
OSV
SaltStack Salt command injection via a crafted process name2022-05-24
GHSA
SaltStack Salt command injection via a crafted process name2022-05-24
OSV
CVE-2020-28243: An issue was discovered in SaltStack Salt before 30022021-02-27
CVEList
CVE-2020-28243: An issue was discovered in SaltStack Salt before 30022021-02-27

📋Vendor Advisories

2
Ubuntu
Salt vulnerabilities2024-08-08
Red Hat
salt: Privilege escalation on a minion when an unprivileged user is able to create files in any non-blacklisted directory2021-02-25