CVE-2017-8109

The salt-ssh minion code in SaltStack Salt 2016.11 before 2016.11.4 copied over configuration from the Salt Master without adjusting permissions, which might leak credentials to local attackers on configured minions (clients).
References
Link Resource
http://www.securityfocus.com/bid/98095 Third Party Advisory VDB Entry
https://bugzilla.suse.com/show_bug.cgi?id=1035912 Issue Tracking Patch
https://docs.saltstack.com/en/latest/topics/releases/2016.11.4.html Patch Release Notes Vendor Advisory
https://github.com/saltstack/salt/issues/40075 Issue Tracking Patch Third Party Advisory
https://github.com/saltstack/salt/pull/40609 Issue Tracking Patch Third Party Advisory
https://github.com/saltstack/salt/pull/40609/commits/6e34c2b5e5e849302af7ccd00509929c3809c658 Issue Tracking Patch Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:saltstack:salt:2016.11:*:*:*:*:*:*:*
cpe:2.3:a:saltstack:salt:2016.11.0:*:*:*:*:*:*:*
cpe:2.3:a:saltstack:salt:2016.11.0:rc1:*:*:*:*:*:*
cpe:2.3:a:saltstack:salt:2016.11.0:rc2:*:*:*:*:*:*
cpe:2.3:a:saltstack:salt:2016.11.1:*:*:*:*:*:*:*
cpe:2.3:a:saltstack:salt:2016.11.2:*:*:*:*:*:*:*
cpe:2.3:a:saltstack:salt:2016.11.3:*:*:*:*:*:*:*

History

No history.

Information

Published : 2017-04-25 17:59

Updated : 2023-12-10 12:01


NVD link : CVE-2017-8109

Mitre link : CVE-2017-8109

CVE.ORG link : CVE-2017-8109


JSON object : View

Products Affected

saltstack

  • salt
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor