CVE Vulnerabilities

CVE-2021-25281

Improper Authentication

Published: Feb 27, 2021 | Modified: Nov 21, 2024
CVSS 3.x
9.8
CRITICAL
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
7.5 HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
8.1 IMPORTANT
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Ubuntu
MEDIUM

An issue was discovered in through SaltStack Salt before 3002.5. salt-api does not honor eauth credentials for the wheel_async client. Thus, an attacker can remotely run any wheel modules on the master.

Weakness

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.

Affected Software

Name Vendor Start Version End Version
Salt Saltstack * 2015.8.10 (excluding)
Salt Saltstack 2015.8.11 (including) 2015.8.13 (excluding)
Salt Saltstack 2016.3.0 (including) 2016.3.4 (excluding)
Salt Saltstack 2016.3.5 (including) 2016.3.6 (excluding)
Salt Saltstack 2016.3.7 (including) 2016.3.8 (excluding)
Salt Saltstack 2016.3.9 (including) 2016.11.3 (excluding)
Salt Saltstack 2016.11.4 (including) 2016.11.5 (excluding)
Salt Saltstack 2016.11.7 (including) 2016.11.10 (excluding)
Salt Saltstack 2017.5.0 (including) 2017.7.8 (excluding)
Salt Saltstack 2018.2.0 (including) 2018.3.5 (including)
Salt Saltstack 2019.2.0 (including) 2019.2.5 (excluding)
Salt Saltstack 2019.2.6 (including) 2019.2.8 (excluding)
Salt Saltstack 3000 (including) 3000.6 (excluding)
Salt Saltstack 3001 (including) 3001.4 (excluding)
Salt Saltstack 3002 (including) 3002.5 (excluding)
Salt Ubuntu bionic *
Salt Ubuntu esm-apps/bionic *
Salt Ubuntu esm-apps/xenial *
Salt Ubuntu groovy *
Salt Ubuntu hirsute *
Salt Ubuntu impish *
Salt Ubuntu kinetic *
Salt Ubuntu trusty *
Salt Ubuntu trusty/esm *
Salt Ubuntu xenial *

Potential Mitigations

References