SaltStack Multiple High-Risk Vulnerabilities Alert

Built on Python, Salt uses simple and human-readable YAML combined with event-driven automation to deploy and configure complex IT systems. In addition to leveling-up vRealize Automation SaltStack Config, Salt can be found under the hood of products from Juniper, Cisco, Cloudflare, Nutanix, SUSE, and Tieto, to name a few.

On February 25, 2021, SaltStack had released a risk notice for the February security update. SaltStack has fixed 10 vulnerabilities in this update, including 6 high-risk vulnerabilities.

Vulnerability Detail

CVE-2021-3197: The Salt-API’s SSH client is vulnerable to a shell injection by including ProxyCommand in an argument, or via ssh_options provided in an API request.

CVE-2021-25281: The Salt-API does not have eAuth credentials for the wheel_async client.

CVE-2021-25282: The salt.wheel.pillar_roots.write method is vulnerable to directory traversal.

CVE-2021-25283: The jinja renderer does not protect against server-side template injection attacks.

CVE-2021-25284: webutils write passwords in cleartext to /var/log/salt/minion.

CVE-2021-3148: command injection in salt.utils.thin.gen_thin().

CVE-2020-35662: Several places where Salt was not verifying the SSL cert by default.

CVE-2021-3144: Token can be used once after expiration.

CVE-2020-28972: Missing validation on SSL cert.

CVE-2020-28243: Local Privilege Escalation in the Minion

Solution

In this regard, we recommend that users upgrade SaltStack to the latest version in time.