CVE-2021-3148
Severity CVSS v4.0:
Pending analysis
Type:
CWE-77
Command Injection
Publication date:
27/02/2021
Last modified:
21/12/2023
Description
An issue was discovered in SaltStack Salt before 3002.5. Sending crafted web requests to the Salt API can result in salt.utils.thin.gen_thin() command injection because of different handling of single versus double quotes. This is related to salt/utils/thin.py.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:* | 2015.8.10 (excluding) | |
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:* | 2015.8.11 (including) | 2015.8.13 (excluding) |
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:* | 2016.3.0 (including) | 2016.3.4 (excluding) |
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:* | 2016.3.5 (including) | 2016.3.6 (excluding) |
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:* | 2016.3.7 (including) | 2016.3.8 (excluding) |
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:* | 2016.3.9 (including) | 2016.11.3 (excluding) |
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:* | 2016.11.4 (including) | 2016.11.5 (excluding) |
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:* | 2016.11.7 (including) | 2016.11.10 (excluding) |
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:* | 2017.5.0 (including) | 2017.7.8 (excluding) |
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:* | 2018.2.0 (including) | 2018.3.5 (including) |
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:* | 2019.2.0 (including) | 2019.2.5 (excluding) |
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:* | 2019.2.6 (including) | 2019.2.8 (excluding) |
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:* | 3000 (including) | 3000.6 (excluding) |
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:* | 3001 (including) | 3001.4 (excluding) |
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:* | 3002 (including) | 3002.5 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://github.com/saltstack/salt/releases
- https://lists.debian.org/debian-lts-announce/2021/11/msg00009.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7GRVZ5WAEI3XFN2BDTL6DDXFS5HYSDVB/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FUGLOJ6NXLCIFRD2JTXBYQEMAEF2B6XH/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YOGNT2XWPOYV7YT75DN7PS4GIYWFKOK5/
- https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/
- https://security.gentoo.org/glsa/202103-01
- https://security.gentoo.org/glsa/202310-22
- https://www.debian.org/security/2021/dsa-5011