Built on Python, Salt uses simple and human-readable YAML combined with event-driven automation to deploy and configure complex IT systems. In addition to leveling-up vRealize Automation SaltStack Config, Salt can be found under the hood of products from Juniper, Cisco, Cloudflare, Nutanix, SUSE, and Tieto, to name a few.
CVE-2021-3197: The Salt-API’s SSH client is vulnerable to a shell injection by including ProxyCommand in an argument, or via ssh_options provided in an API request.
CVE-2021-25281: The Salt-API does not have eAuth credentials for the wheel_async client.
CVE-2021-25282: The salt.wheel.pillar_roots.write method is vulnerable to directory traversal.
CVE-2021-25283: The jinja renderer does not protect against server-side template injection attacks.
CVE-2021-25284: webutils write passwords in cleartext to /var/log/salt/minion.
CVE-2021-3148: command injection in salt.utils.thin.gen_thin().
CVE-2020-35662: Several places where Salt was not verifying the SSL cert by default.
CVE-2021-3144: Token can be used once after expiration.
CVE-2020-28972: Missing validation on SSL cert.
CVE-2020-28243: Local Privilege Escalation in the Minion
The post SaltStack Multiple High-Risk Vulnerabilities Alert appeared first on InfoTech News.