CVE-2021-31607

Name
CVE-2021-31607
Description
In SaltStack Salt 2016.9 through 3002.6, a command injection vulnerability exists in the snapper module that allows for local privilege escalation on a minion. The attack requires that a file is created with a pathname that is backed up by snapper, and that the master calls the snapper.diff function (which executes popen unsafely).
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
MISC https://sec.stealthcopter.com/saltstack-snapper-minion-privledge-escaltion/
FEDORA https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LDKMAJXYFHM4USVX3H5V2GCCBGASWUSM/
Mailing List https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MBAHHSGZLEJRCG4DX6J4RBWJAAWH55RQ/
Mailing List https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ACVT7M4YLZRLWWQ6SGRK3C6TOF4FXOXT/
FEDORA https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6BUWUF5VTENNP2ZYZBVFKPSUHLKLUBD5/
Mailing List https://lists.debian.org/debian-lts-announce/2021/11/msg00009.html
Third Party Advisory https://www.debian.org/security/2021/dsa-5011

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:* salt >= 2016.9 <= 3002.6

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
salt 3.13-community 3003-r0 Kevin Daudt <kdaudt@alpinelinux.org> fixed