Safety vulnerability ID: 41925
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Salt 3002.7 includes a fix for CVE-2021-31607: In SaltStack Salt 2016.9 through 3002.6, a command injection vulnerability exists in the snapper module that allows for local privilege escalation on a minion. The attack requires that a file is created with a pathname that is backed up by snapper, and that the master calls the snapper.diff function (which executes popen unsafely).
https://sec.stealthcopter.com/saltstack-snapper-minion-privledge-escaltion/
Latest version: 3007.1
Portable, distributed, remote execution and configuration management system
========================
Version 3001.8 is a bug fix release for :ref:`3001 <release-3001>`.
Fixed
-----
- Verify the owner of an existing config before trusting it during install. If the owner cannot be verified, back it up and use defaults. (CVE-2021-22004)
Security
--------
- Fix the CVE-2021-31607 vulnerability
Additionally, an audit and a tool was put in place, ``bandit``, to address similar issues througout the code base, and prevent them. (CVE-2021-31607)
- Ensure that sourced file is cached using its hash name (cve-2021-21996)
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application