SaltStack 3000 < 3002.8 / 3003 < 3003.4 / 3004 < 3004.1 Multiple Vulnerabilities

high Nessus Plugin ID 159497

Synopsis

The version of SaltStack running on the remote server is affected by multiple vulnerabilities.

Description

According to its self-reported version number, the instance of SaltStack hosted on the remote server is affected by multiple vulnerabilities:

- Salt Masters do not sign pillar data with the minion's public key, which can result in attackers substituting arbitrary pillar data. (CVE-2022-22934)

- Job publishes and file server replies are susceptible to replay attacks, which can result in an attacker replaying job publishes causing minions to run old jobs. (CVE-2022-22936)
- When configured as a Master-of-Masters, with a publisher_acl, if a user configured in the publisher_acl targets any minion connected to the Syndic, the Salt Master incorrectly interpreted no valid targets as valid, allowing configured users to target any of the minions connected to the syndic with their configured commands. (CVE-2022-22941)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version

Solution

Upgrade to SaltStack version referenced in the vendor security advisory.

See Also

http://www.nessus.org/u?0f399e6f

Plugin Details

Severity: High

ID: 159497

File Name: saltstack_3004_1.nasl

Version: 1.3

Type: local

Agent: unix

Family: Misc.

Published: 4/5/2022

Updated: 10/6/2023

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 6

Temporal Score: 4.4

Vector: CVSS2#AV:N/AC:M/Au:S/C:P/I:P/A:P

CVSS Score Source: CVE-2022-22941

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 7.7

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:saltstack:salt

Required KB Items: installed_sw/SaltStack Salt Master

Exploit Ease: No known exploits are available

Patch Publication Date: 3/28/2022

Vulnerability Publication Date: 3/28/2022

Reference Information

CVE: CVE-2022-22934, CVE-2022-22935, CVE-2022-22936, CVE-2022-22941

IAVA: 2022-A-0128-S