CVE-2022-22936: SaltStack Salt Authentication Bypass by Capture-replay
(updated )
An issue was discovered in SaltStack Salt in versions before 3002.8, 3003.4, 3004.1. Job publishes and file server replies are susceptible to replay attacks, which can result in an attacker replaying job publishes causing minions to run old jobs. File server replies can also be re-played. A sufficient craft attacker could gain root access on minion under certain scenarios.
References
- github.com/advisories/GHSA-5r3f-3m3j-wcj2
- github.com/pypa/advisory-database/tree/main/vulns/salt/PYSEC-2022-173.yaml
- github.com/saltstack/salt
- github.com/saltstack/salt/blob/8f9405cf8e6f7d7776d5000841c886dec6d96250/doc/topics/releases/3002.8.rst
- github.com/saltstack/salt/blob/8f9405cf8e6f7d7776d5000841c886dec6d96250/doc/topics/releases/3003.4.rst
- github.com/saltstack/salt/blob/8f9405cf8e6f7d7776d5000841c886dec6d96250/doc/topics/releases/3004.1.rst
- github.com/saltstack/salt/releases
- nvd.nist.gov/vuln/detail/CVE-2022-22936
- repo.saltproject.io/
- saltproject.io/security_announcements/salt-security-advisory-release
- security.gentoo.org/glsa/202310-22
Detect and mitigate CVE-2022-22936 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →