SaltStack 3000 < 3005.4 / 3006 < 3006.4 Security Bypass

high Nessus Plugin ID 185733

Synopsis

The version of SaltStack running on the remote server is affected by security bypass vulnerability.

Description

According to its self-reported version number, the instance of SaltStack hosted on the remote server is affected by a security bypass vulnerability. The Salt-SSH pre-flight option copies the script to the target at a predictable path, which allows an attacker to force Salt-SSH to run their script. If an attacker has access to the target VM and knows the path to the pre-flight script before it runs they can ensure Salt-SSH runs their script with the privileges of the user running Salt-SSH.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version

Solution

Upgrade to SaltStack version referenced in the vendor security advisory.

See Also

http://www.nessus.org/u?40d8b9d6

Plugin Details

Severity: High

ID: 185733

File Name: saltstack_3005_4.nasl

Version: 1.3

Type: local

Agent: unix

Family: Misc.

Published: 11/15/2023

Updated: 2/23/2024

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.2

CVSS v2

Risk Factor: Medium

Base Score: 6.2

Temporal Score: 4.6

Vector: CVSS2#AV:L/AC:H/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2023-34049

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.8

Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:saltstack:salt

Required KB Items: installed_sw/SaltStack Salt Master

Exploit Ease: No known exploits are available

Patch Publication Date: 10/27/2023

Vulnerability Publication Date: 10/27/2023

Reference Information

CVE: CVE-2023-34049

IAVA: 2023-A-0609-S