CVE-2017-8109

The salt-ssh minion code in SaltStack Salt 2016.11 before 2016.11.4 copied over configuration from the Salt Master without adjusting permissions, which might leak credentials to local attackers on configured minions (clients).
References
Link Resource
http://www.securityfocus.com/bid/98095 Third Party Advisory VDB Entry
https://bugzilla.suse.com/show_bug.cgi?id=1035912 Issue Tracking Patch
https://docs.saltstack.com/en/latest/topics/releases/2016.11.4.html Patch Release Notes Vendor Advisory
https://github.com/saltstack/salt/issues/40075 Issue Tracking Patch Third Party Advisory
https://github.com/saltstack/salt/pull/40609 Issue Tracking Patch Third Party Advisory
https://github.com/saltstack/salt/pull/40609/commits/6e34c2b5e5e849302af7ccd00509929c3809c658 Issue Tracking Patch Third Party Advisory
http://www.securityfocus.com/bid/98095 Third Party Advisory VDB Entry
https://bugzilla.suse.com/show_bug.cgi?id=1035912 Issue Tracking Patch
https://docs.saltstack.com/en/latest/topics/releases/2016.11.4.html Patch Release Notes Vendor Advisory
https://github.com/saltstack/salt/issues/40075 Issue Tracking Patch Third Party Advisory
https://github.com/saltstack/salt/pull/40609 Issue Tracking Patch Third Party Advisory
https://github.com/saltstack/salt/pull/40609/commits/6e34c2b5e5e849302af7ccd00509929c3809c658 Issue Tracking Patch Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:saltstack:salt:2016.11:*:*:*:*:*:*:*
cpe:2.3:a:saltstack:salt:2016.11.0:*:*:*:*:*:*:*
cpe:2.3:a:saltstack:salt:2016.11.0:rc1:*:*:*:*:*:*
cpe:2.3:a:saltstack:salt:2016.11.0:rc2:*:*:*:*:*:*
cpe:2.3:a:saltstack:salt:2016.11.1:*:*:*:*:*:*:*
cpe:2.3:a:saltstack:salt:2016.11.2:*:*:*:*:*:*:*
cpe:2.3:a:saltstack:salt:2016.11.3:*:*:*:*:*:*:*

History

21 Nov 2024, 03:33

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/98095 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/98095 - Third Party Advisory, VDB Entry
References () https://bugzilla.suse.com/show_bug.cgi?id=1035912 - Issue Tracking, Patch () https://bugzilla.suse.com/show_bug.cgi?id=1035912 - Issue Tracking, Patch
References () https://docs.saltstack.com/en/latest/topics/releases/2016.11.4.html - Patch, Release Notes, Vendor Advisory () https://docs.saltstack.com/en/latest/topics/releases/2016.11.4.html - Patch, Release Notes, Vendor Advisory
References () https://github.com/saltstack/salt/issues/40075 - Issue Tracking, Patch, Third Party Advisory () https://github.com/saltstack/salt/issues/40075 - Issue Tracking, Patch, Third Party Advisory
References () https://github.com/saltstack/salt/pull/40609 - Issue Tracking, Patch, Third Party Advisory () https://github.com/saltstack/salt/pull/40609 - Issue Tracking, Patch, Third Party Advisory
References () https://github.com/saltstack/salt/pull/40609/commits/6e34c2b5e5e849302af7ccd00509929c3809c658 - Issue Tracking, Patch, Third Party Advisory () https://github.com/saltstack/salt/pull/40609/commits/6e34c2b5e5e849302af7ccd00509929c3809c658 - Issue Tracking, Patch, Third Party Advisory

Information

Published : 2017-04-25 17:59

Updated : 2024-11-21 03:33


NVD link : CVE-2017-8109

Mitre link : CVE-2017-8109

CVE.ORG link : CVE-2017-8109


JSON object : View

Products Affected

saltstack

  • salt
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor