Severity |
|
Remote |
|
Type |
|
Description |
+ |
It has been discovered that maliciously crafted minion IDs can cause unwanted directory traversals on the salt-master. The flaw is within the minion id validation which could allow certain minions to authenticate to a master despite not having the correct credentials. To exploit the vulnerability, an attacker must create a salt-minion with an ID containing path seperators that will cause a directory traversal. |
|
References |
+ |
https://groups.google.com/forum/#!topic/salt-announce/X8ZiQrZLujA |
+ |
https://github.com/saltstack/salt/commit/80d90307b07b3703428ecbb7c8bb468e28a9ae6d |
|
Notes |
+ |
This is the complete fix to an earlier vulnerability where not all characters were correctly handled to prevent directory traversal. |
+ |
https://security.archlinux.org/CVE-2017-12791 |
|