The vulnerabilities described in this advisory allow an attacker who can 
connect to the "request server" port to bypass all authentication and 
authorization controls and publish arbitrary control messages, read and write 
files anywhere on the "master" server filesystem and steal the secret key used 
to authenticate to the master as root. The impact is full remote command 
execution as root on both the master and all minions that connect to it.

The vulnerabilities, allocated CVE ids CVE-2020-11651 CVE-2020-11652, are of 
two different classes. One being authentication bypass where functionality was 
unintentionally exposed to unauthenticated network clients, the other being 
directory traversal where untrusted input (i.e. parameters in network requests) 
was not sanitized correctly allowing unconstrained access to the entire 
filesystem of the master server.

https://labs.f-secure.com/advisories/saltstack-authorization-bypass



_______________________________________________
Medianews mailing list
[email protected]
http://etskywarn.net/mailman/listinfo/medianews_etskywarn.net

Reply via email to