In SaltStack Salt through 3002, salt-netapi improperly validates eauth credentials and tokens. A user can bypass authentication and invoke Salt SSH.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Salt | Saltstack | * | 2015.8.10 (excluding) |
Salt | Saltstack | 2015.8.11 (including) | 2015.8.13 (excluding) |
Salt | Saltstack | 2016.3.0 (including) | 2016.3.4 (excluding) |
Salt | Saltstack | 2016.3.5 (including) | 2016.3.6 (excluding) |
Salt | Saltstack | 2016.3.7 (including) | 2016.3.8 (excluding) |
Salt | Saltstack | 2016.11.0 (including) | 2016.11.3 (excluding) |
Salt | Saltstack | 2016.11.4 (including) | 2016.11.6 (excluding) |
Salt | Saltstack | 2016.11.7 (including) | 2016.11.10 (excluding) |
Salt | Saltstack | 2017.5.0 (including) | 2017.7.4 (excluding) |
Salt | Saltstack | 2017.7.5 (including) | 2017.7.8 (excluding) |
Salt | Saltstack | 2018.2.0 (including) | 2018.3.5 (excluding) |
Salt | Saltstack | 2019.2.0 (including) | 2019.2.5 (excluding) |
Salt | Saltstack | 3000.0 (including) | 3000.3 (excluding) |
Salt | Saltstack | 3001 (including) | 3001 (including) |
Salt | Ubuntu | bionic | * |
Salt | Ubuntu | esm-apps/bionic | * |
Salt | Ubuntu | esm-apps/xenial | * |
Salt | Ubuntu | groovy | * |
Salt | Ubuntu | hirsute | * |
Salt | Ubuntu | impish | * |
Salt | Ubuntu | kinetic | * |
Salt | Ubuntu | trusty | * |
Salt | Ubuntu | xenial | * |