2.1
CVSSv2

CVE-2020-17490

Published: 06/11/2020 Updated: 07/11/2023
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 187
Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

An issue has been found in Salt prior to 3001.3, 3000.5, 2019.2.7 where, when using the functions create_ca, create_csr, and create_self_signed_cert in the tls execution module, it will not ensure the key was created with the correct permissions.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

saltstack salt 3001

saltstack salt

debian debian linux 9.0

debian debian linux 10.0

Vendor Advisories

Several vulnerabilities were discovered in salt, a powerful remote execution manager The flaws could result in authentication bypass and invocation of Salt SSH, creation of certificates with weak file permissions via the TLS execution module or shell injections with the Salt API using the SSH client For the stable distribution (buster), these pro ...
An issue has been found in Salt before 30013, 30005, 201927 where, when using the functions create_ca, create_csr, and create_self_signed_cert in the tls execution module, it will not ensure the key was created with the correct permissions ...

Recent Articles

Automation software slinger SaltStack warns of stop-watching-the-election-and-patch-now bugs
The Register • Simon Sharwood, APAC Editor • 04 Nov 2020

Fixes look to have landed in GitHub well ahead of disclosure

SaltStack has officially revealed three bugs in its code – two of them seemingly critical – and told users: “We strongly recommend that you prioritize this update.” But the biz appears to have known about the bugs for months and quietly patched them over the summer. SaltStack offers open-source, Python-based automation tools. It was acquired by VMware in October, and Virtzilla hailed the deal as completing and extending its automation offerings and to help it provide a full-stack offerin...