SaltStack Salt 2018.3, 2019.2 is affected by: SQL Injection. The impact is: An attacker could escalate privileges on MySQL server deployed by cloud provider. It leads to RCE. The component is: The mysql.user_chpass function from the MySQL module for Salt. The attack vector is: specially crafted password string. The fixed version is: 2018.3.4.
References
Link | Resource |
---|---|
https://github.com/saltstack/salt/blob/f22de0887cd7167887f113bf394244b74fb36b6b/salt/modules/mysql.py#L1534 | Exploit Third Party Advisory |
https://github.com/ShantonRU/salt/commit/a46c86a987c78e74e87969d8d3b27094e6544b7a | Patch Third Party Advisory |
https://github.com/saltstack/salt/pull/51462 | Issue Tracking Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2019-07-18 10:15
Updated : 2019-08-13 11:15
NVD link : CVE-2019-1010259
Mitre link : CVE-2019-1010259
JSON object : View
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Products Affected
saltstack
- salt_2019
- salt_2018