6
CVSSv2

CVE-2022-22941

Published: 29/03/2022 Updated: 21/12/2023
CVSS v2 Base Score: 6 | Impact Score: 6.4 | Exploitability Score: 6.8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 535
Vector: AV:N/AC:M/Au:S/C:P/I:P/A:P

Vulnerability Summary

An issue exists in SaltStack Salt in versions prior to 3002.8, 3003.4, 3004.1. When configured as a Master-of-Masters, with a publisher_acl, if a user configured in the publisher_acl targets any minion connected to the Syndic, the Salt Master incorrectly interpreted no valid targets as valid, allowing configured users to target any of the minions connected to the syndic with their configured commands. This requires a syndic master combined with publisher_acl configured on the Master-of-Masters, allowing users specified in the publisher_acl to bypass permissions, publishing authorized commands to any configured minion.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

saltstack salt

Vendor Advisories

Debian Bug report logs - #1008945 salt: CVE-2022-22934 CVE-2022-22935 CVE-2022-22936 CVE-2022-22941 Package: src:salt; Maintainer for src:salt is Debian Salt Team <pkg-salt-team@alioth-listsdebiannet>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Mon, 4 Apr 2022 19:45:02 UTC Severity: grave Tags: se ...