CVE-2021-31607 PUBLISHED

In SaltStack Salt 2016.9 through 3002.6, a command injection vulnerability exists in the snapper module that allows for local privilege escalation on a minion. The attack requires that a file is created with a pathname that is backed up by snapper, and that the master calls the snapper.diff function (which executes popen unsafely).

EPSS 4.55% · 89.1th percentile

Risk Scores

EPSS Score
4.55%
89.1th percentile

Affected Products

VendorProductVersions
Ubuntu:22.04:LTSsalt0, *, *
Ubuntu:Pro:16.04:LTSsalt2015.8.3+ds-2, 0, 2015.8.1+ds-2
Ubuntu:Pro:18.04:LTSsalt2017.7.3+dfsg1-1, 2017.7.4+dfsg1-1ubuntu18.04.2, 2017.7.4+dfsg1-1ubuntu18.04.2+esm1
Ubuntu:Pro:14.04:LTSsalt0, 0.17.5+ds-1ubuntu0.1~esm1, 0.17.2-1

Timeline

References

Open in Interactive Console →