Critical Vulnerability in Salt Requires Immediate Patching

  • Guess this will be coming downstream soon!


    CVE-2020-11651: An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2. The salt-master process ClearFuncs class does not properly validate method calls. This allows a remote user to access some methods without authentication. These methods can be used to retrieve user tokens from the salt master and/or run arbitrary commands on salt minions.



    CVE-2020-11652: An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2. The salt-master process ClearFuncs class allows access to some methods that improperly sanitize paths. These methods allow arbitrary directory access to authenticated users.


    NAS-OMV:~$ sudo apt list --installed |grep salt


    WARNING: apt does not have a stable CLI interface. Use with caution in scripts.


    salt-common/usul,usul,now 2019.2.3+ds-1 all [installed,automatic]

    salt-minion/usul,usul,now 2019.2.3+ds-1 all [installed,automatic]

    NAS-OMV:~$



    https://www.theregister.co.uk/…ation_tool_vulnerable_to/


    https://www.securityweek.com/c…8SecurityWeek+RSS+Feed%29

    • Offizieller Beitrag

    votdev might have a different opinion but I wouldn't think there would be much attack surface on OMV since it isn't running in a master/minion setup. These are OMV supplied packages. So, Volker will have to update them to get the fix.

    omv 7.0.5-1 sandworm | 64 bit | 6.8 proxmox kernel

    plugins :: omvextrasorg 7.0 | kvm 7.0.13 | compose 7.1.6 | k8s 7.1.0-3 | cputemp 7.0.1 | mergerfs 7.0.4


    omv-extras.org plugins source code and issue tracker - github - changelogs


    Please try ctrl-shift-R and read this before posting a question.

    Please put your OMV system details in your signature.
    Please don't PM for support... Too many PMs!

Jetzt mitmachen!

Sie haben noch kein Benutzerkonto auf unserer Seite? Registrieren Sie sich kostenlos und nehmen Sie an unserer Community teil!