Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2021-25281

Severity
9.8CRITICAL
EPSS
93.8%
top 0.13%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedFeb 27
Latest updateAug 8

Description

An issue was discovered in through SaltStack Salt before 3002.5. salt-api does not honor eauth credentials for the wheel_async client. Thus, an attacker can remotely run any wheel modules on the master.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages2 packages

NVDsaltstack/salt2015.8.112015.8.13+14
PyPIsalt2015.8.112015.8.13+22

Also affects: Debian Linux 10.0, 11.0, 9.0, Fedora 32, 33, 34

🔴Vulnerability Details

5
OSV
SaltStack Salt Improper Authentication vulnerability2022-05-24
GHSA
SaltStack Salt Improper Authentication vulnerability2022-05-24
OSV
CVE-2021-25281: An issue was discovered in through SaltStack Salt before 30022021-02-27
CVEList
CVE-2021-25281: An issue was discovered in through SaltStack Salt before 30022021-02-27
VulnCheck
SaltStack Salt Improper Authentication2021

💥Exploits & PoCs

1
Nuclei
SaltStack Salt <3002.5 - Auth Bypass

📋Vendor Advisories

2
Ubuntu
Salt vulnerabilities2024-08-08
Red Hat
salt: API does not honor eAuth credentials for the wheel_async client2021-02-25