SaltStack < 3002 Multiple Vulnerabilities

critical Nessus Plugin ID 142489

Synopsis

The version of SaltStack running on the remote server is affected by multiple vulnerabilities.

Description

According to its self-reported version number, the instance of SaltStack hosted on the remote server is affected by multiple vulnerabilities:

- eauth is not sufficiently validated when calling Salt SSH via the salt-api. Any value for 'eauth' or 'token' will allow a user to bypass authentication and make calls to Salt SSH. (CVE-2020-25592)

- When using the functions create_ca, create_csr, and create_self_signed_cert in the tls execution module, the generated keys will not be created with the correct permissions. (CVE-2020-17490)

- A command injection vulnerability exists in Salt API. An unauthenticated, remote attacker can exploit this, via the use of shell injections with the Salt API using the SSH Client, to execute arbitrary commands. (CVE-2020-16846)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version

Solution

Upgrade to SaltStack version referenced in the vendor security advisory.

See Also

http://www.nessus.org/u?f2a5e02b

http://www.nessus.org/u?c2f8b1d8

Plugin Details

Severity: Critical

ID: 142489

File Name: saltstack_3002_multiple_vulnerabilities.nasl

Version: 1.12

Type: local

Agent: unix

Family: Misc.

Published: 11/6/2020

Updated: 4/25/2023

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.4

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.2

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2020-25592

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 9.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:saltstack:salt

Required KB Items: installed_sw/SaltStack Salt Master

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 11/3/2020

Vulnerability Publication Date: 11/3/2020

CISA Known Exploited Vulnerability Due Dates: 5/3/2022

Exploitable With

Metasploit (SaltStack Salt REST API Arbitrary Command Execution)

Reference Information

CVE: CVE-2020-16846, CVE-2020-17490, CVE-2020-25592

IAVA: 2020-A-0195-S