Vulnerability Details : CVE-2020-11651
Public exploit exists!
An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2. The salt-master process ClearFuncs class does not properly validate method calls. This allows a remote user to access some methods without authentication. These methods can be used to retrieve user tokens from the salt master and/or run arbitrary commands on salt minions.
Products affected by CVE-2020-11651
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:application_remote_collector:7.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:application_remote_collector:8.0.0:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
- cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
- cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*
- cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*
CVE-2020-11651 is in the CISA Known Exploited Vulnerabilities Catalog
CISA vulnerability name:
SaltStack Salt Authentication Bypass Vulnerability
CISA required action:
Apply updates per vendor instructions.
CISA description:
SaltStack Salt contains an authentication bypass vulnerability in the salt-master process ClearFuncs due to improperly validating method calls. The vulnerability allows a remote user to access some methods without authentication, which can be used to retrieve user tokens from the salt master and/or
Notes:
https://nvd.nist.gov/vuln/detail/CVE-2020-11651
Added on
2021-11-03
Action due date
2022-05-03
Exploit prediction scoring system (EPSS) score for CVE-2020-11651
97.48%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 100 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2020-11651
-
SaltStack Salt Master Server Root Key Disclosure
Disclosure Date: 2020-04-30First seen: 2020-05-14auxiliary/gather/saltstack_salt_root_keyThis module exploits unauthenticated access to the _prep_auth_info() method in the SaltStack Salt master's ZeroMQ request server, for versions 2019.2.3 and earlier and 3000.1 and earlier, to disclose the root key used to authenticate administrative commands t -
SaltStack Salt Master/Minion Unauthenticated RCE
Disclosure Date: 2020-04-30First seen: 2020-05-14exploit/linux/misc/saltstack_salt_unauth_rceThis module exploits unauthenticated access to the runner() and _send_pub() methods in the SaltStack Salt master's ZeroMQ request server, for versions 2019.2.3 and earlier and 3000.1 and earlier, to execute code as root on either the master or on select minio
CVSS scores for CVE-2020-11651
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST | |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
References for CVE-2020-11651
-
http://www.vmware.com/security/advisories/VMSA-2020-0009.html
VMSA-2020-0009Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00047.html
[security-announce] openSUSE-SU-2020:0564-1: critical: Security update fMailing List;Third Party Advisory
-
https://www.debian.org/security/2020/dsa-4676
Debian -- Security Information -- DSA-4676-1 saltThird Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00070.html
[security-announce] openSUSE-SU-2020:1074-1: moderate: Security update fMailing List;Third Party Advisory
-
http://packetstormsecurity.com/files/157678/SaltStack-Salt-Master-Minion-Unauthenticated-Remote-Code-Execution.html
SaltStack Salt Master/Minion Unauthenticated Remote Code Execution ≈ Packet StormExploit;Third Party Advisory;VDB Entry
-
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-salt-2vx545AG
SaltStack FrameWork Vulnerabilities Affecting Cisco ProductsThird Party Advisory
-
https://lists.debian.org/debian-lts-announce/2020/05/msg00027.html
[SECURITY] [DLA 2223-1] salt security updateMailing List;Third Party Advisory
-
https://docs.saltstack.com/en/latest/topics/releases/2019.2.4.html
Salt 2019.2.4 Release NotesVendor Advisory
-
https://usn.ubuntu.com/4459-1/
USN-4459-1: Salt vulnerabilities | Ubuntu security notices | UbuntuThird Party Advisory
-
https://github.com/saltstack/salt/blob/v3000.2_docs/doc/topics/releases/3000.2.rst
salt/3000.2.rst at v3000.2_docs · saltstack/salt · GitHubThird Party Advisory
-
http://packetstormsecurity.com/files/157560/Saltstack-3000.1-Remote-Code-Execution.html
Saltstack 3000.1 Remote Code Execution ≈ Packet StormExploit;Third Party Advisory;VDB Entry
Jump to