CVE-2020-11651
Scores
EPSS Score
0.9439
CVSS
3.x 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
All CVSS Scores
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Description
An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2. The salt-master process ClearFuncs class does not properly validate method calls. This allows a remote user to access some methods without authentication. These methods can be used to retrieve user tokens from the salt master and/or run arbitrary commands on salt minions.
Sources
CWEs
Related Vulnerabilities
Exploits
Reference Links
Vulnerable Software
Type: Configuration
Product: salt
Operating System: ubuntu bionic 18.04
{
"fixed": "2017.7.4+dfsg1-1ubuntu18.04.2"
}
Source: ubuntu
Type: Configuration
Product: salt
Operating System: ubuntu eoan 19.10
{
"unfixed": true
}
Source: ubuntu
Type: Configuration
Product: salt
Operating System: ubuntu jammy 22.04
{
"unaffected": true
}
Source: ubuntu
Type: Configuration
Product: salt
Operating System: ubuntu kinetic 22.10
{
"unaffected": true
}
Source: ubuntu
Type: Configuration
Product: salt
Operating System: ubuntu trusty 14.04
{
"unfixed": true
}
Source: ubuntu
Type: Configuration
Product: salt
Operating System: ubuntu xenial 16.04
{
"fixed": "2015.8.8+ds-1ubuntu0.1"
}
Source: ubuntu
Type: Configuration
Product: salt
Operating System: debian
{
"fixed": "3000.2+dfsg1-1"
}
Source: debian
Type: Configuration
Vendor: canonical
Product: ubuntu_linux
Operating System: * * *
{
"cpe_match": [
{
"cpe23uri": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"vulnerable": true
},
{
"cpe23uri": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"vulnerable": true
}
],
"operator": "OR"
}
Source: nvd
Type: Configuration
Vendor: debian
Product: debian_linux
Operating System: * * *
{
"cpe_match": [
{
"cpe23uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"vulnerable": true
},
{
"cpe23uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"vulnerable": true
},
{
"cpe23uri": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"vulnerable": true
}
],
"operator": "OR"
}
Source: nvd
Type: Configuration
Vendor: opensuse
Product: leap
Operating System: * * *
{
"cpe_match": [
{
"cpe23uri": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"vulnerable": true
}
],
"operator": "OR"
}
Source: nvd
Type: Configuration
Vendor: saltstack
Product: salt
Operating System: * * *
{
"cpe_match": [
{
"cpe23uri": "cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2019.2.4",
"vulnerable": true
},
{
"cpe23uri": "cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3000.2",
"versionStartIncluding": "3000",
"vulnerable": true
}
],
"operator": "OR"
}
Source: nvd
Type: Configuration
Vendor: vmware
Product: application_remote_collector
Operating System: * * *
{
"cpe_match": [
{
"cpe23uri": "cpe:2.3:a:vmware:application_remote_collector:7.5.0:*:*:*:*:*:*:*",
"vulnerable": true
},
{
"cpe23uri": "cpe:2.3:a:vmware:application_remote_collector:8.0.0:*:*:*:*:*:*:*",
"vulnerable": true
}
],
"operator": "OR"
}
Source: nvd