SaltStack Salt 输入验证错误漏洞

admin 2024-01-14 22:02:50 YS 来源:ZONE.CI 全球网 0 阅读模式
> SaltStack Salt 输入验证错误漏洞

SaltStack Salt 输入验证错误漏洞

CNNVD-ID编号 CNNVD-202004-2446 CVE编号 CVE-2020-11652
发布时间 2020-04-30 更新时间 2020-08-17
漏洞类型 输入验证错误 漏洞来源 N/A
危险等级 中危 威胁类型 远程
厂商 N/A

漏洞介绍

SaltStack Salt是SaltStack公司的一套开源的用于管理基础架构的工具。该工具提供配置管理、远程执行等功能。

SaltStack Salt 2019.2.4之前版本和3000.2之前的3000.x版本中的salt-master进程的ClearFuncs类存在输入验证错误漏洞,该漏洞源于不正确的访问控制。远程攻击者可利用该漏洞访问任意目录。

漏洞补丁

目前厂商已发布升级了SaltStack Salt 输入验证错误漏洞的补丁,SaltStack Salt 输入验证错误漏洞的补丁获取链接:

参考网址

来源:MISC

链接:https://docs.saltstack.com/en/latest/topics/releases/2019.2.4.html

来源:MISC

链接:https://packetstormsecurity.com/files/157678/SaltStack-Salt-Master-Minion-Unauthenticated-Remote-Code-Execution.html

来源:CONFIRM

链接:https://www.vmware.com/security/advisories/VMSA-2020-0009.html

来源:MISC

链接:https://packetstormsecurity.com/files/157560/Saltstack-3000.1-Remote-Code-Execution.html

来源:MISC

链接:http://support.blackberry.com/kb/articleDetail?articleNumber=000063758

来源:MISC

链接:https://github.com/saltstack/salt/blob/v3000.2_docs/doc/topics/releases/3000.2.rst

来源:MLIST

链接:https://lists.debian.org/debian-lts-announce/2020/05/msg00027.html

来源:CISCO

链接:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-salt-2vx545AG

来源:SUSE

链接:http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00070.html

来源:SUSE

链接:http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00047.html

来源:DEBIAN

链接:https://www.debian.org/security/2020/dsa-4676

来源:usn.ubuntu.com

链接:https://usn.ubuntu.com/4459-1/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.1640/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.1894/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.1547/

来源:vigilance.fr

链接:https://vigilance.fr/vulnerability/SaltStack-Salt-two-vulnerabilities-32154

来源:www.huawei.com

链接:https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20200715-01-salt-cn

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.2494/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.2097/

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/157560/Saltstack-3000.1-Remote-Code-Execution.html

来源:www.exploit-db.com

链接:https://www.exploit-db.com/exploits/48421

来源:nvd.nist.gov

链接:https://nvd.nist.gov/vuln/detail/CVE-2020-11652

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/158873/Ubuntu-Security-Notice-USN-4459-1.html

来源:cxsecurity.com

链接:https://cxsecurity.com/issue/WLB-2020050064

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/157678/SaltStack-Salt-Master-Minion-Unauthenticated-Remote-Code-Execution.html

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.1607/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.2817/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.2508/

来源:www.nsfocus.net

链接:http://www.nsfocus.net/vulndb/46580

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.1756/

来源:tools.cisco.com

链接:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-salt-2vx545AG

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.1884.2/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.1884/

受影响实体

暂无

信息来源

http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-202004-2446

weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论:0   参与:  2