CVE-2017-14695

HIGH

Description

Directory traversal vulnerability in minion id validation in SaltStack Salt before 2016.3.8, 2016.11.x before 2016.11.8, and 2017.7.x before 2017.7.2 allows remote minions with incorrect credentials to authenticate to a master via a crafted minion ID. NOTE: this vulnerability exists because of an incomplete fix for CVE-2017-12791.

References

http://lists.opensuse.org/opensuse-updates/2017-10/msg00073.html

http://lists.opensuse.org/opensuse-updates/2017-10/msg00075.html

https://bugzilla.redhat.com/show_bug.cgi?id=1500748

https://docs.saltstack.com/en/latest/topics/releases/2016.11.8.html

https://docs.saltstack.com/en/latest/topics/releases/2016.3.8.html

https://docs.saltstack.com/en/latest/topics/releases/2017.7.2.html

https://github.com/saltstack/salt/commit/80d90307b07b3703428ecbb7c8bb468e28a9ae6d

Details

Source: MITRE

Published: 2017-10-24

Updated: 2017-11-14

Type: CWE-22

Risk Information

CVSS v2.0

Base Score: 7.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 10

Severity: HIGH

CVSS v3.0

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Impact Score: 5.9

Exploitability Score: 3.9

Severity: CRITICAL