Enhancement: cves/2021/CVE-2021-25281.yaml by mp

patch-1
MostInterestingBotInTheWorld 2022-05-17 09:57:57 -04:00
parent 43cbd4f1e9
commit 3ea9db5a8b
1 changed files with 5 additions and 2 deletions

View File

@ -1,13 +1,14 @@
id: CVE-2021-25281 id: CVE-2021-25281
info: info:
name: SaltStack wheel_async unauth access name: SaltStack Salt <3002.5 - Auth Bypass
author: madrobot author: madrobot
severity: critical severity: critical
description: The SaltAPI does not honor eauth credentials for the wheel_async client. Thus, an attacker can remotely run any wheel modules on the master. description: SaltStack Salt before 3002.5 does not honor eauth credentials for the wheel_async client. Thus, an attacker can remotely run any wheel modules on the master.
reference: reference:
- http://hackdig.com/02/hack-283902.htm - http://hackdig.com/02/hack-283902.htm
- https://dozer.nz/posts/saltapi-vulns - https://dozer.nz/posts/saltapi-vulns
- https://nvd.nist.gov/vuln/detail/CVE-2021-25281
classification: classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8 cvss-score: 9.8
@ -39,3 +40,5 @@ requests:
- type: status - type: status
status: status:
- 200 - 200
# Enhanced by mp on 2022/05/17