CVE-2017-14695

Source
Severity Medium
Remote Yes
Type Directory traversal
Description
It has been discovered that maliciously crafted minion IDs can cause unwanted directory traversals on the salt-master. The flaw is within the minion id validation which could allow certain minions to authenticate to a master despite not having the correct credentials. To exploit the vulnerability, an attacker must create a salt-minion with an ID containing path seperators that will cause a directory traversal.
Group Package Affected Fixed Severity Status Ticket
AVG-438 salt 2017.7.1-1 2017.7.2-1 Medium Fixed
Date Advisory Group Package Severity Description
09 Oct 2017 ASA-201710-12 AVG-438 salt Medium multiple issues
References
https://groups.google.com/forum/#!topic/salt-announce/X8ZiQrZLujA
https://github.com/saltstack/salt/commit/80d90307b07b3703428ecbb7c8bb468e28a9ae6d
Notes
This is the complete fix to an earlier vulnerability where not all characters were correctly handled to prevent directory traversal.
https://security.archlinux.org/CVE-2017-12791