// For flags

CVE-2020-11652

SaltStack Salt Path Traversal Vulnerability

Severity Score

6.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

10
*Multiple Sources

Exploited in Wild

Yes
*KEV

Decision

Attend
*SSVC
Descriptions

An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2. The salt-master process ClearFuncs class allows access to some methods that improperly sanitize paths. These methods allow arbitrary directory access to authenticated users.

Se descubrió un problema en SaltStack Salt versiones anteriores a la versión 2019.2.4 y versiones 3000 anteriores a 3000.2. La clase ClearFuncs del proceso Salt-master permite acceder a algunos métodos que sanean inapropiadamente las rutas. Estos métodos permiten acceso a directorios arbitrarios a usuarios autenticados.

It was discovered that Salt allows remote attackers to determine which files exist on the server. An attacker could use that to extract sensitive information. It was discovered that Salt has a vulnerability that allows an user to bypass authentication. An attacker could use that to extract sensitive information, execute arbitrary code or crash the server. It was discovered that Salt is vulnerable to command injection. This allows an unauthenticated attacker with network access to the API endpoint to execute arbitrary code on the salt-api host. Various other issues were also addressed.

SaltStack Salt contains a path traversal vulnerability in the salt-master process ClearFuncs which allows directory access to authenticated users. Salt users who follow fundamental internet security guidelines and best practices are not affected by this vulnerability.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Attend
Exploitation
Active
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2020-04-08 CVE Reserved
  • 2020-04-30 CVE Published
  • 2020-05-05 First Exploit
  • 2021-11-03 Exploited in Wild
  • 2022-05-03 KEV Due Date
  • 2025-02-04 CVE Updated
  • 2025-03-24 EPSS Updated
CWE
  • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CAPEC
References (25)
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Saltstack
Search vendor "Saltstack"
Salt
Search vendor "Saltstack" for product "Salt"
< 2019.2.4
Search vendor "Saltstack" for product "Salt" and version " < 2019.2.4"
-
Affected
Saltstack
Search vendor "Saltstack"
Salt
Search vendor "Saltstack" for product "Salt"
>= 3000 < 3000.2
Search vendor "Saltstack" for product "Salt" and version " >= 3000 < 3000.2"
-
Affected
Opensuse
Search vendor "Opensuse"
Leap
Search vendor "Opensuse" for product "Leap"
15.1
Search vendor "Opensuse" for product "Leap" and version "15.1"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
8.0
Search vendor "Debian" for product "Debian Linux" and version "8.0"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
9.0
Search vendor "Debian" for product "Debian Linux" and version "9.0"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
10.0
Search vendor "Debian" for product "Debian Linux" and version "10.0"
-
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
16.04
Search vendor "Canonical" for product "Ubuntu Linux" and version "16.04"
esm
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
18.04
Search vendor "Canonical" for product "Ubuntu Linux" and version "18.04"
lts
Affected
Blackberry
Search vendor "Blackberry"
Workspaces Server
Search vendor "Blackberry" for product "Workspaces Server"
<= 7.1.3
Search vendor "Blackberry" for product "Workspaces Server" and version " <= 7.1.3"
-
Affected
Blackberry
Search vendor "Blackberry"
Workspaces Server
Search vendor "Blackberry" for product "Workspaces Server"
>= 8.0.0 <= 8.2.6
Search vendor "Blackberry" for product "Workspaces Server" and version " >= 8.0.0 <= 8.2.6"
-
Affected
Blackberry
Search vendor "Blackberry"
Workspaces Server
Search vendor "Blackberry" for product "Workspaces Server"
9.1.0
Search vendor "Blackberry" for product "Workspaces Server" and version "9.1.0"
-
Affected
Vmware
Search vendor "Vmware"
Application Remote Collector
Search vendor "Vmware" for product "Application Remote Collector"
7.5.0
Search vendor "Vmware" for product "Application Remote Collector" and version "7.5.0"
-
Affected
Vmware
Search vendor "Vmware"
Application Remote Collector
Search vendor "Vmware" for product "Application Remote Collector"
8.0.0
Search vendor "Vmware" for product "Application Remote Collector" and version "8.0.0"
-
Affected