CVE-2023-34049: Salt preflight script could be attacker controlled
The Salt-SSH pre-flight option copies the script to the target at a predictable path, which allows an attacker to force Salt-SSH to run their script. If an attacker has access to the target VM and knows the path to the pre-flight script before it runs they can ensure Salt-SSH runs their script with the privileges of the user running Salt-SSH. Do not make the copy path on the target predictable and ensure we check return codes of the scp command if the copy fails.
References
- github.com/advisories/GHSA-4277-m35q-7c9w
- github.com/saltstack/salt
- github.com/saltstack/salt/commit/286d55eb5a6e6bf9428405bdf5632b419bdf8444
- github.com/saltstack/salt/commit/7a14112f2a16ce70e3c3e1862c92e37af5f2c7a4
- nvd.nist.gov/vuln/detail/CVE-2023-34049
- saltproject.io/security-announcements/2023-10-27-advisory
Detect and mitigate CVE-2023-34049 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →