Enhancement: cves/2021/CVE-2021-25281.yaml by mp
parent
43cbd4f1e9
commit
3ea9db5a8b
|
@ -1,13 +1,14 @@
|
||||||
id: CVE-2021-25281
|
id: CVE-2021-25281
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: SaltStack wheel_async unauth access
|
name: SaltStack Salt <3002.5 - Auth Bypass
|
||||||
author: madrobot
|
author: madrobot
|
||||||
severity: critical
|
severity: critical
|
||||||
description: The SaltAPI does not honor eauth credentials for the wheel_async client. Thus, an attacker can remotely run any wheel modules on the master.
|
description: SaltStack Salt before 3002.5 does not honor eauth credentials for the wheel_async client. Thus, an attacker can remotely run any wheel modules on the master.
|
||||||
reference:
|
reference:
|
||||||
- http://hackdig.com/02/hack-283902.htm
|
- http://hackdig.com/02/hack-283902.htm
|
||||||
- https://dozer.nz/posts/saltapi-vulns
|
- https://dozer.nz/posts/saltapi-vulns
|
||||||
|
- https://nvd.nist.gov/vuln/detail/CVE-2021-25281
|
||||||
classification:
|
classification:
|
||||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
||||||
cvss-score: 9.8
|
cvss-score: 9.8
|
||||||
|
@ -39,3 +40,5 @@ requests:
|
||||||
- type: status
|
- type: status
|
||||||
status:
|
status:
|
||||||
- 200
|
- 200
|
||||||
|
|
||||||
|
# Enhanced by mp on 2022/05/17
|
||||||
|
|
Loading…
Reference in New Issue