An issue was discovered in SaltStack Salt in versions before 3002.9, 3003.5, 3004.2. PAM auth fails to reject locked accounts, which allows a previously authorized user whose account is locked still run Salt commands when their account is locked. This affects both local shell accounts with an active session and salt-api users that authenticate via PAM eauth.
References
Link | Resource |
---|---|
https://repo.saltproject.io/ | Product Vendor Advisory |
https://saltproject.io/security_announcements/salt-security-advisory-release-june-21st-2022/%2C | Broken Link |
https://security.gentoo.org/glsa/202310-22 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Dec 2023, 18:44
Type | Values Removed | Values Added |
---|---|---|
References | () https://saltproject.io/security_announcements/salt-security-advisory-release-june-21st-2022/%2C - Broken Link | |
References | (GENTOO) https://security.gentoo.org/glsa/202310-22 - Third Party Advisory |
07 Nov 2023, 03:44
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
31 Oct 2023, 14:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2022-06-23 17:15
Updated : 2024-02-28 19:09
NVD link : CVE-2022-22967
Mitre link : CVE-2022-22967
CVE.ORG link : CVE-2022-22967
JSON object : View
Products Affected
saltstack
- salt
CWE
CWE-863
Incorrect Authorization