Description
In SaltStack Salt 2016.9 through 3002.6, a command injection vulnerability exists in the snapper module that allows for local privilege escalation on a minion. The attack requires that a file is created with a pathname that is backed up by snapper, and that the master calls the snapper.diff function (which executes popen unsafely).
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2815-1 | salt security update |
Debian DSA |
DSA-5011-1 | salt security update |
Github GHSA |
GHSA-hcjf-rp5h-g5h3 | Command Injection in SaltStack Salt |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-03T23:03:33.642Z
Reserved: 2021-04-23T00:00:00.000Z
Link: CVE-2021-31607
No data.
Status : Modified
Published: 2021-04-23T06:15:07.893
Modified: 2024-11-21T06:05:59.270
Link: CVE-2021-31607
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
Github GHSA