Vulnerability Details : CVE-2020-11652
Public exploit exists!
An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2. The salt-master process ClearFuncs class allows access to some methods that improperly sanitize paths. These methods allow arbitrary directory access to authenticated users.
Vulnerability category: Directory traversal
Products affected by CVE-2020-11652
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:application_remote_collector:7.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:application_remote_collector:8.0.0:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
- cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
- cpe:2.3:a:blackberry:workspaces_server:*:*:*:*:*:*:*:*
- cpe:2.3:a:blackberry:workspaces_server:*:*:*:*:*:*:*:*
- cpe:2.3:a:blackberry:workspaces_server:9.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*
- cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*
CVE-2020-11652 is in the CISA Known Exploited Vulnerabilities Catalog
CISA vulnerability name:
SaltStack Salt Path Traversal Vulnerability
CISA required action:
Apply updates per vendor instructions.
CISA description:
SaltStack Salt contains a path traversal vulnerability in the salt-master process ClearFuncs which allows directory access to authenticated users. Salt users who follow fundamental internet security guidelines and best practices are not affected by this vulnerability.
Notes:
https://nvd.nist.gov/vuln/detail/CVE-2020-11652
Added on
2021-11-03
Action due date
2022-05-03
Exploit prediction scoring system (EPSS) score for CVE-2020-11652
97.14%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 100 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2020-11652
-
SaltStack Salt Master Server Root Key Disclosure
Disclosure Date: 2020-04-30First seen: 2020-05-14auxiliary/gather/saltstack_salt_root_keyThis module exploits unauthenticated access to the _prep_auth_info() method in the SaltStack Salt master's ZeroMQ request server, for versions 2019.2.3 and earlier and 3000.1 and earlier, to disclose the root key used to authenticate administrative commands t -
SaltStack Salt Master/Minion Unauthenticated RCE
Disclosure Date: 2020-04-30First seen: 2020-05-14exploit/linux/misc/saltstack_salt_unauth_rceThis module exploits unauthenticated access to the runner() and _send_pub() methods in the SaltStack Salt master's ZeroMQ request server, for versions 2019.2.3 and earlier and 3000.1 and earlier, to execute code as root on either the master or on select minio
CVSS scores for CVE-2020-11652
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.0
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:N/A:N |
8.0
|
2.9
|
NIST | |
6.5
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
2.8
|
3.6
|
NIST |
CWE ids for CVE-2020-11652
-
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.Assigned by: nvd@nist.gov (Primary)
References for CVE-2020-11652
-
http://www.vmware.com/security/advisories/VMSA-2020-0009.html
VMSA-2020-0009Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00047.html
[security-announce] openSUSE-SU-2020:0564-1: critical: Security update fMailing List;Third Party Advisory
-
http://support.blackberry.com/kb/articleDetail?articleNumber=000063758
BSRT-2020-002 Input Validation Vulnerability in Server Configuration Management Impacts BlackBerry Workspaces Server (deployed with Appliance-X)Third Party Advisory
-
https://www.debian.org/security/2020/dsa-4676
Debian -- Security Information -- DSA-4676-1 saltThird Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00070.html
[security-announce] openSUSE-SU-2020:1074-1: moderate: Security update fMailing List;Third Party Advisory
-
http://packetstormsecurity.com/files/157678/SaltStack-Salt-Master-Minion-Unauthenticated-Remote-Code-Execution.html
SaltStack Salt Master/Minion Unauthenticated Remote Code Execution ≈ Packet StormExploit;Third Party Advisory;VDB Entry
-
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-salt-2vx545AG
SaltStack FrameWork Vulnerabilities Affecting Cisco ProductsThird Party Advisory
-
https://lists.debian.org/debian-lts-announce/2020/05/msg00027.html
[SECURITY] [DLA 2223-1] salt security updateMailing List;Third Party Advisory
-
https://docs.saltstack.com/en/latest/topics/releases/2019.2.4.html
Salt 2019.2.4 Release NotesVendor Advisory
-
https://usn.ubuntu.com/4459-1/
USN-4459-1: Salt vulnerabilities | Ubuntu security notices | UbuntuThird Party Advisory
-
https://github.com/saltstack/salt/blob/v3000.2_docs/doc/topics/releases/3000.2.rst
salt/3000.2.rst at v3000.2_docs · saltstack/salt · GitHubThird Party Advisory
-
http://packetstormsecurity.com/files/157560/Saltstack-3000.1-Remote-Code-Execution.html
Saltstack 3000.1 Remote Code Execution ≈ Packet StormThird Party Advisory;VDB Entry
Jump to