SaltStack Salt command injection via a crafted process name
High severity
GitHub Reviewed
Published
May 24, 2022
to the GitHub Advisory Database
•
Updated Oct 22, 2024
Package
Affected versions
< 2015.8.13
>= 2016.3.0, < 2016.11.5
>= 2016.11.7, < 2016.11.10
>= 2017.5.0, < 2017.7.8
>= 2018.2.0, <= 2018.3.5
>= 2019.2.0, < 2019.2.8
>= 3000, < 3000.7
>= 3001, < 3001.5
>= 3002, < 3002.3
Patched versions
2015.8.13
2016.11.5
2016.11.10
2017.7.8
2019.2.8
3000.7
3001.5
3002.3
Description
Published by the National Vulnerability Database
Feb 27, 2021
Published to the GitHub Advisory Database
May 24, 2022
Reviewed
Apr 22, 2024
Last updated
Oct 22, 2024
An issue was discovered in SaltStack Salt before 3002.5. The minion's
restartcheck
is vulnerable to command injection via a crafted process name. This allows for a local privilege escalation by any user able to create a files on the minion in a non-blacklisted directory.References