From 3538d5c96d5b02615ef8c1de3ffaca0469344b20 Mon Sep 17 00:00:00 2001 From: MostInterestingBotInTheWorld <98333686+MostInterestingBotInTheWorld@users.noreply.github.com> Date: Tue, 17 May 2022 15:11:14 -0400 Subject: [PATCH] Enhancement: cves/2021/CVE-2021-25281.yaml by mp --- cves/2021/CVE-2021-25281.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-25281.yaml b/cves/2021/CVE-2021-25281.yaml index c9e2af51f6..a9c37d75ab 100644 --- a/cves/2021/CVE-2021-25281.yaml +++ b/cves/2021/CVE-2021-25281.yaml @@ -4,7 +4,7 @@ info: name: SaltStack Salt <3002.5 - Auth Bypass author: madrobot severity: critical - description: SaltStack Salt before 3002.5 does not honor eauth credentials for the wheel_async client. Thus, an attacker can remotely run any wheel modules on the master. + description: SaltStack Salt before 3002.5 does not honor eauth credentials for the wheel_async client, allowing attackers to remotely run any wheel modules on the master. reference: - http://hackdig.com/02/hack-283902.htm - https://dozer.nz/posts/saltapi-vulns