CVE-2017-14695 log
Source |
|
Severity | Medium |
Remote | Yes |
Type | Directory traversal |
Description | It has been discovered that maliciously crafted minion IDs can cause unwanted directory traversals on the salt-master. The flaw is within the minion id validation which could allow certain minions to authenticate to a master despite not having the correct credentials. To exploit the vulnerability, an attacker must create a salt-minion with an ID containing path seperators that will cause a directory traversal. |
Group | Package | Affected | Fixed | Severity | Status | Ticket |
---|---|---|---|---|---|---|
AVG-438 | salt | 2017.7.1-1 | 2017.7.2-1 | Medium | Fixed |
Date | Advisory | Group | Package | Severity | Type |
---|---|---|---|---|---|
09 Oct 2017 | ASA-201710-12 | AVG-438 | salt | Medium | multiple issues |
References |
---|
https://groups.google.com/forum/#!topic/salt-announce/X8ZiQrZLujA https://github.com/saltstack/salt/commit/80d90307b07b3703428ecbb7c8bb468e28a9ae6d |
Notes |
---|
This is the complete fix to an earlier vulnerability where not all characters were correctly handled to prevent directory traversal. https://security.archlinux.org/CVE-2017-12791 |