CVE-2021-25281 Scanner
Detects 'Improper Access Control' vulnerability in SaltStack Salt affects v. before 3002.5.
Short Info
Level
Critical
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
15 seconds
Time Interval
29 days
Scan only one
URL
Toolbox
-
SaltStack Salt is a popular open-source configuration management and orchestration software used for automating data center infrastructure and cloud computing. This powerful tool is designed to make it easier to deploy and manage complex IT environments of all sizes. It simplifies operations by automating system administration tasks, and helps organizations maintain compliance and security standards.
CVE-2021-25281 is a critical vulnerability that has been discovered in SaltStack Salt before version 3002.5. This vulnerability affects salt-api, which is used for remote execution of various administration tasks on the Salt master. The issue is due to the fact that salt-api fails to authenticate clients using eauth credentials, making it possible for attackers to remotely execute any wheel module on the target system.
This vulnerability can be exploited by attackers, leading to malicious activities such as data theft, ransomware attacks, and system takeovers. By using this flaw, an attacker can gain unauthorized access to sensitive information stored in the system, deploy malware payloads, and compromise the overall security of the IT environment.
Thanks to the pro features of the s4e.io platform, those who read this article can quickly and easily learn about vulnerabilities in their digital assets. This tool can help users identify and mitigate security risks before they can be exploited by attackers. By leveraging the platform's features, users can ensure that their IT infrastructure is secure and protected from cyber threats.
REFERENCES
- http://packetstormsecurity.com/files/162058/SaltStack-Salt-API-Unauthenticated-Remote-Command-Execution.html
- https://github.com/saltstack/salt/releases
- https://lists.fedoraproject.org/archives/list/[email protected]/message/7GRVZ5WAEI3XFN2BDTL6DDXFS5HYSDVB/
- https://lists.fedoraproject.org/archives/list/[email protected]/message/FUGLOJ6NXLCIFRD2JTXBYQEMAEF2B6XH/
- https://lists.fedoraproject.org/archives/list/[email protected]/message/YOGNT2XWPOYV7YT75DN7PS4GIYWFKOK5/
- https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/
- https://security.gentoo.org/glsa/202103-01
- https://www.saltstack.com/blog/active-saltstack-cve-announced-2021-jan-21/