CVE-2022-22967: Salt's PAM auth fails to reject locked accounts
(updated )
An issue was discovered in SaltStack Salt in versions before 3002.9, 3003.5, 3004.2. PAM auth fails to reject locked accounts, which allows a previously authorized user whose account is locked still run Salt commands when their account is locked. This affects both local shell accounts with an active session and salt-api users that authenticate via PAM eauth.
References
- github.com/advisories/GHSA-fpxm-fprw-6hxj
- github.com/pypa/advisory-database/tree/main/vulns/salt/PYSEC-2022-210.yaml
- github.com/saltstack/salt
- nvd.nist.gov/vuln/detail/CVE-2022-22967
- repo.saltproject.io/
- saltproject.io/security_announcements/salt-security-advisory-release-june-21st-2022/,
- security.gentoo.org/glsa/202310-22
Detect and mitigate CVE-2022-22967 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →