CVE-2020-11652: SaltStack Salt is vulnerable Arbitrary Directory Access
(updated )
An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2. The salt-master process ClearFuncs class allows access to some methods that improperly sanitize paths. These methods allow arbitrary directory access to authenticated users.
References
- github.com/advisories/GHSA-vp49-2g4r-m3x3
- github.com/pypa/advisory-database/tree/main/vulns/salt/PYSEC-2020-103.yaml
- github.com/saltstack/salt
- github.com/saltstack/salt/blob/v3000.2_docs/doc/topics/releases/3000.2.rst
- lists.debian.org/debian-lts-announce/2020/05/msg00027.html
- nvd.nist.gov/vuln/detail/CVE-2020-11652
- tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-salt-2vx545AG
- usn.ubuntu.com/4459-1
- www.debian.org/security/2020/dsa-4676
Detect and mitigate CVE-2020-11652 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →