Lucene search

K
cveMitreCVE-2021-25281
HistoryFeb 27, 2021 - 5:15 a.m.

CVE-2021-25281

2021-02-2705:15:13
CWE-287
mitre
web.nvd.nist.gov
256
13
cve-2021-25281
saltstack
salt
nvd
security
remote code execution

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.2

Confidence

High

EPSS

0.859

Percentile

98.6%

An issue was discovered in through SaltStack Salt before 3002.5. salt-api does not honor eauth credentials for the wheel_async client. Thus, an attacker can remotely run any wheel modules on the master.

Affected configurations

Nvd
Node
saltstacksaltRange<2015.8.10
OR
saltstacksaltRange2015.8.11–2015.8.13
OR
saltstacksaltRange2016.3.0–2016.3.4
OR
saltstacksaltRange2016.3.5–2016.3.6
OR
saltstacksaltRange2016.3.7–2016.3.8
OR
saltstacksaltRange2016.3.9–2016.11.3
OR
saltstacksaltRange2016.11.4–2016.11.5
OR
saltstacksaltRange2016.11.7–2016.11.10
OR
saltstacksaltRange2017.5.0–2017.7.8
OR
saltstacksaltRange2018.2.0–2018.3.5
OR
saltstacksaltRange2019.2.0–2019.2.5
OR
saltstacksaltRange2019.2.6–2019.2.8
OR
saltstacksaltRange3000–3000.6
OR
saltstacksaltRange3001–3001.4
OR
saltstacksaltRange3002–3002.5
Node
fedoraprojectfedoraMatch32
OR
fedoraprojectfedoraMatch33
OR
fedoraprojectfedoraMatch34
Node
debiandebian_linuxMatch9.0
OR
debiandebian_linuxMatch10.0
OR
debiandebian_linuxMatch11.0
VendorProductVersionCPE
saltstacksalt*cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*
fedoraprojectfedora32cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
fedoraprojectfedora33cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
fedoraprojectfedora34cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
debiandebian_linux9.0cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
debiandebian_linux10.0cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
debiandebian_linux11.0cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

References

Social References

More

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.2

Confidence

High

EPSS

0.859

Percentile

98.6%