CVE-2017-14695 log
| Source |
|
| Severity | Medium |
| Remote | Yes |
| Type | Directory traversal |
| Description | It has been discovered that maliciously crafted minion IDs can cause unwanted directory traversals on the salt-master. The flaw is within the minion id validation which could allow certain minions to authenticate to a master despite not having the correct credentials. To exploit the vulnerability, an attacker must create a salt-minion with an ID containing path seperators that will cause a directory traversal. |
| Group | Package | Affected | Fixed | Severity | Status | Ticket |
|---|---|---|---|---|---|---|
| AVG-438 | salt | 2017.7.1-1 | 2017.7.2-1 | Medium | Fixed |
| Date | Advisory | Group | Package | Severity | Type |
|---|---|---|---|---|---|
| 09 Oct 2017 | ASA-201710-12 | AVG-438 | salt | Medium | multiple issues |
| References |
|---|
https://groups.google.com/forum/#!topic/salt-announce/X8ZiQrZLujA https://github.com/saltstack/salt/commit/80d90307b07b3703428ecbb7c8bb468e28a9ae6d |
| Notes |
|---|
This is the complete fix to an earlier vulnerability where not all characters were correctly handled to prevent directory traversal. https://security.archlinux.org/CVE-2017-12791 |