Directory traversal vulnerability in minion id validation in SaltStack Salt before 2016.11.7 and 2017.7.x before 2017.7.1 allows remote minions with incorrect credentials to authenticate to a master via a crafted minion ID.
References
Link | Resource |
---|---|
https://github.com/saltstack/salt/pull/42944 | Issue Tracking Patch Third Party Advisory |
https://docs.saltstack.com/en/latest/topics/releases/2017.7.1.html | Release Notes Patch Vendor Advisory |
https://docs.saltstack.com/en/2016.11/topics/releases/2016.11.7.html | Release Notes Patch Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1482006 | Issue Tracking Patch Third Party Advisory |
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=872399 | Issue Tracking Patch Third Party Advisory |
http://www.securityfocus.com/bid/100384 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
Information
Published : 2017-08-23 07:29
Updated : 2017-08-29 09:43
NVD link : CVE-2017-12791
Mitre link : CVE-2017-12791
JSON object : View
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
saltstack
- salt