Lucene search

K
ubuntucveUbuntu.comUB:CVE-2017-5192
HistorySep 26, 2017 - 12:00 a.m.

CVE-2017-5192

2017-09-2600:00:00
ubuntu.com
ubuntu.com
14

CVSS2

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.002

Percentile

58.7%

When using the local_batch client from salt-api in SaltStack Salt before
2015.8.13, 2016.3.x before 2016.3.5, and 2016.11.x before 2016.11.2,
external authentication is not respected, enabling all authentication to be
bypassed.
The LocalClient.cmd_batch() method client does not accept external_auth
credentials and so access to it from salt-api has been removed for
now. This vulnerability allows code execution for already-authenticated
users and is only in effect when running salt-api as the root user.

OSVersionArchitecturePackageVersionFilename
ubuntu14.04noarchsalt< anyUNKNOWN
ubuntu16.04noarchsalt< anyUNKNOWN

CVSS2

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.002

Percentile

58.7%