Description
In SaltStack Salt 2016.9 through 3002.6, a command injection vulnerability exists in the snapper module that allows for local privilege escalation on a minion. The attack requires that a file is created with a pathname that is backed up by snapper, and that the master calls the snapper.diff function (which executes popen unsafely).
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2815-1 | salt security update |
Debian DSA |
DSA-5011-1 | salt security update |
Github GHSA |
GHSA-hcjf-rp5h-g5h3 | Command Injection in SaltStack Salt |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-03T23:03:33.642Z
Reserved: 2021-04-23T00:00:00.000Z
Link: CVE-2021-31607
No data.
Status : Modified
Published: 2021-04-23T06:15:07.893
Modified: 2024-11-21T06:05:59.270
Link: CVE-2021-31607
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
Github GHSA