Security vulnerability: Salt stack remote code execution CVE-2020-11651, CVE-2020-11652
This document (000019619) is provided subject to the disclaimer at the end of this document.
Security researchers have identified bugs in the salt stack network protocol code that allowed unauthenticated remote attackers able to access the master over the network to inject files and so execute code as root users on the salt master systems.
All SUSE maintained salt versions are affected by this problem.
The salt-master process ClearFuncs class did not properly validate method calls. This allowed a remote attacker to access some methods without authentication. These methods can be used to retrieve user tokens from the salt master and/or run arbitrary commands on salt minions.
The salt-master process ClearFuncs class allowed access to some methods that improperly sanitize paths. These methods allow arbitrary directory access to authenticated users.
This Support Knowledgebase provides a valuable tool for SUSE customers and parties interested in our products and solutions to acquire information, ideas and learn from one another. Materials are provided for informational, personal or non-commercial use within your organization and are presented "AS IS" WITHOUT WARRANTY OF ANY KIND.
- Document ID:000019619
- Creation Date: 30-Apr-2020
- Modified Date:30-Apr-2020
- SUSE Linux Enterprise Server
- SUSE Manager for Retail
- SUSE Manager Server
For questions or concerns with the SUSE Knowledgebase please contact: tidfeedback[at]suse.com