CVE-2021-21996: Exposure of Resource to Wrong Sphere
(updated )
An issue was discovered in SaltStack Salt before 3003.3. A user who has control of the source, and source_hash URLs can gain full file system access as root on a salt minion.
References
- github.com/advisories/GHSA-pf7h-h2wq-m7pg
- github.com/pypa/advisory-database/tree/main/vulns/salt/PYSEC-2021-318.yaml
- lists.debian.org/debian-lts-announce/2021/11/msg00017.html
- lists.debian.org/debian-lts-announce/2021/11/msg00019.html
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6BUWUF5VTENNP2ZYZBVFKPSUHLKLUBD5/
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ACVT7M4YLZRLWWQ6SGRK3C6TOF4FXOXT/
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MBAHHSGZLEJRCG4DX6J4RBWJAAWH55RQ/
- nvd.nist.gov/vuln/detail/CVE-2021-21996
- saltproject.io/security_announcements/salt-security-advisory-2021-sep-02/
- www.debian.org/security/2021/dsa-5011
Detect and mitigate CVE-2021-21996 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →