In SaltStack Salt 2016.9 through 3002.6, a command injection vulnerability exists in the snapper module that allows for local privilege escalation on a minion. The attack requires that a file is created with a pathname that is backed up by snapper, and that the master calls the snapper.diff function (which executes popen unsafely).
Advisories
Source ID Title
Debian DLA Debian DLA DLA-2815-1 salt security update
Debian DSA Debian DSA DSA-5011-1 salt security update
Github GHSA Github GHSA GHSA-hcjf-rp5h-g5h3 Command Injection in SaltStack Salt
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-03T23:03:33.642Z

Reserved: 2021-04-23T00:00:00

Link: CVE-2021-31607

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-04-23T06:15:07.893

Modified: 2024-11-21T06:05:59.270

Link: CVE-2021-31607

cve-icon Redhat

Severity : Moderate

Publid Date: 2021-04-23T00:00:00Z

Links: CVE-2021-31607 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses