7.1
CVSSv2

CVE-2021-21996

Published: 08/09/2021 Updated: 21/12/2023
CVSS v2 Base Score: 7.1 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.5 | Impact Score: 5.9 | Exploitability Score: 1.6
VMScore: 632
Vector: AV:N/AC:H/Au:S/C:C/I:C/A:C

Vulnerability Summary

An issue exists in SaltStack Salt prior to 3003.3. A user who has control of the source, and source_hash URLs can gain full file system access as root on a salt minion.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

saltstack salt

fedoraproject fedora 33

fedoraproject fedora 34

fedoraproject fedora 35

debian debian linux 9.0

debian debian linux 10.0

debian debian linux 11.0

Vendor Advisories

Debian Bug report logs - #994016 salt: CVE-2021-21996 CVE-2021-22004 Package: src:salt; Maintainer for src:salt is Debian Salt Team <pkg-salt-team@alioth-listsdebiannet>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Thu, 9 Sep 2021 19:33:02 UTC Severity: grave Tags: security, upstream Found in vers ...
Multiple security vulnerabilities have been discovered in Salt, a powerful remote execution manager, that allow for local privilege escalation on a minion, server side template injection attacks, insufficient checks for eauth credentials, shell and command injections or incorrect validation of SSL certificates For the oldstable distribution (buste ...
An issue was discovered in SaltStack Salt before 30033 A user who has control of the source, and source_hash URLs can gain full file system access as root on a salt minion ...