Search criteria

1 vulnerability by Salt

CVE-2023-34049 (GCVE-0-2023-34049)

Vulnerability from cvelistv5 – Published: 2024-11-14 04:13 – Updated: 2024-11-14 15:20
VLAI?
Title
Salt security advisory release - 2023-OCT-27
Summary
The Salt-SSH pre-flight option copies the script to the target at a predictable path, which allows an attacker to force Salt-SSH to run their script. If an attacker has access to the target VM and knows the path to the pre-flight script before it runs they can ensure Salt-SSH runs their script with the privileges of the user running Salt-SSH. Do not make the copy path on the target predictable and ensure we check return codes of the scp command if the copy fails.
Assigner
Impacted products
Vendor Product Version
Salt SALT Affected: 3005 , < 3005.4 (oss)
Affected: 3004 , < 3006.4 (oss)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:salt_project:salt:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "salt",
            "vendor": "salt_project",
            "versions": [
              {
                "lessThan": "3005.4",
                "status": "affected",
                "version": "3005",
                "versionType": "custom"
              },
              {
                "lessThan": "3006.4",
                "status": "affected",
                "version": "3004",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-34049",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-14T15:12:53.355210Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "description": "CWE-noinfo Not enough information",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-14T15:20:15.288Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "packageName": "SALT",
          "product": "SALT",
          "vendor": "Salt",
          "versions": [
            {
              "lessThan": "3005.4",
              "status": "affected",
              "version": "3005",
              "versionType": "oss"
            },
            {
              "lessThan": "3006.4",
              "status": "affected",
              "version": "3004",
              "versionType": "oss"
            }
          ]
        }
      ],
      "datePublic": "2023-10-28T04:08:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The Salt-SSH pre-flight option copies the script to the target at a predictable path, which allows an attacker to force Salt-SSH to run their script. If an attacker has access to the target VM and knows the path to the pre-flight script before it runs they can ensure Salt-SSH runs their script with the privileges of the user running Salt-SSH.\u0026nbsp;\u003cspan style=\"background-color: rgb(254, 254, 254);\"\u003eDo not make the copy path on the target predictable and ensure we check return codes of the scp command if the copy fails.\u003c/span\u003e\u003cbr\u003e\u003cbr\u003e"
            }
          ],
          "value": "The Salt-SSH pre-flight option copies the script to the target at a predictable path, which allows an attacker to force Salt-SSH to run their script. If an attacker has access to the target VM and knows the path to the pre-flight script before it runs they can ensure Salt-SSH runs their script with the privileges of the user running Salt-SSH.\u00a0Do not make the copy path on the target predictable and ensure we check return codes of the scp command if the copy fails."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-14T04:13:55.255Z",
        "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
        "shortName": "vmware"
      },
      "references": [
        {
          "url": "https://saltproject.io/security-announcements/2023-10-27-advisory/"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Salt security advisory release - 2023-OCT-27",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
    "assignerShortName": "vmware",
    "cveId": "CVE-2023-34049",
    "datePublished": "2024-11-14T04:13:55.255Z",
    "dateReserved": "2023-05-25T17:21:56.202Z",
    "dateUpdated": "2024-11-14T15:20:15.288Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}