CVE-2020-28243

Name
CVE-2020-28243
Description
An issue was discovered in SaltStack Salt before 3002.5. The minion's restartcheck is vulnerable to command injection via a crafted process name. This allows for a local privilege escalation by any user able to create a files on the minion in a non-blacklisted directory.
NVD Severity
unknown
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Vendor Advisory https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/
Exploit https://sec.stealthcopter.com/cve-2020-28243/
Exploit https://github.com/stealthcopter/CVE-2020-28243
Mailing List https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YOGNT2XWPOYV7YT75DN7PS4GIYWFKOK5/
Mailing List https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7GRVZ5WAEI3XFN2BDTL6DDXFS5HYSDVB/
Mailing List https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FUGLOJ6NXLCIFRD2JTXBYQEMAEF2B6XH/
GENTOO https://security.gentoo.org/glsa/202103-01
Mailing List https://lists.debian.org/debian-lts-announce/2021/11/msg00009.html
Third Party Advisory https://www.debian.org/security/2021/dsa-5011
Mailing List https://lists.debian.org/debian-lts-announce/2022/01/msg00000.html
Mailing List https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7GRVZ5WAEI3XFN2BDTL6DDXFS5HYSDVB/
Mailing List https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FUGLOJ6NXLCIFRD2JTXBYQEMAEF2B6XH/
Mailing List https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YOGNT2XWPOYV7YT75DN7PS4GIYWFKOK5/
Third Party Advisory https://security.gentoo.org/glsa/202310-22

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:* salt >= None < 2015.8.10
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:* salt >= 2015.8.11 < 2015.8.13
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:* salt >= 2016.3.0 < 2016.3.4
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:* salt >= 2016.3.5 < 2016.3.6
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:* salt >= 2016.3.7 < 2016.3.8
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:* salt >= 2016.3.9 < 2016.11.3
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:* salt >= 2016.11.4 < 2016.11.5
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:* salt >= 2016.11.7 < 2016.11.10
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:* salt >= 2017.5.0 < 2017.7.8
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:* salt >= 2018.2.0 <= 2018.3.5
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:* salt >= 2019.2.0 < 2019.2.5
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:* salt >= 2019.2.6 < 2019.2.8
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:* salt >= 3000 < 3000.6
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:* salt >= 3001 < 3001.4
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:* salt >= 3002 < 3002.5

Vulnerable and fixed packages

Source package Branch Version Maintainer Status