The Salt-SSH pre-flight option copies the script to the target at a predictable path, which allows an attacker to force Salt-SSH to run their script. If an attacker has access to the target VM and knows the path to the pre-flight script before it runs they can ensure Salt-SSH runs their script with the privileges of the user running Salt-SSH. Do not make the copy path on the target predictable and ensure we check return codes of the scp command if the copy fails.
Metrics
Affected Vendors & Products
References
History
Thu, 14 Nov 2024 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Salt Project
Salt Project salt |
|
CPEs | cpe:2.3:a:salt_project:salt:*:*:*:*:*:*:*:* | |
Vendors & Products |
Salt Project
Salt Project salt |
|
Metrics |
ssvc
|
Thu, 14 Nov 2024 04:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Salt-SSH pre-flight option copies the script to the target at a predictable path, which allows an attacker to force Salt-SSH to run their script. If an attacker has access to the target VM and knows the path to the pre-flight script before it runs they can ensure Salt-SSH runs their script with the privileges of the user running Salt-SSH. Do not make the copy path on the target predictable and ensure we check return codes of the scp command if the copy fails. | |
Title | Salt security advisory release - 2023-OCT-27 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: vmware
Published: 2024-11-14T04:13:55.255Z
Updated: 2024-11-14T15:20:15.288Z
Reserved: 2023-05-25T17:21:56.202Z
Link: CVE-2023-34049
Vulnrichment
Updated: 2024-11-14T15:18:00.386Z
NVD
Status : Received
Published: 2024-11-14T05:15:28.260
Modified: 2024-11-14T05:15:28.260
Link: CVE-2023-34049
Redhat
No data.