CVE-2017-14695

CRITICAL

Salt < 2016.3.7 - Path Traversal

Title source: rule
STIX 2.1

Description

Directory traversal vulnerability in minion id validation in SaltStack Salt before 2016.3.8, 2016.11.x before 2016.11.8, and 2017.7.x before 2017.7.2 allows remote minions with incorrect credentials to authenticate to a master via a crafted minion ID. NOTE: this vulnerability exists because of an incomplete fix for CVE-2017-12791.

References (7)

Core 7
Core References
Issue Tracking, Release Notes, Vendor Advisory x_refsource_confirm
https://docs.saltstack.com/en/latest/topics/releases/2016.3.8.html
Issue Tracking, Release Notes, Third Party Advisory vendor-advisory x_refsource_suse
http://lists.opensuse.org/opensuse-updates/2017-10/msg00075.html
Issue Tracking, Release Notes, Third Party Advisory vendor-advisory x_refsource_suse
http://lists.opensuse.org/opensuse-updates/2017-10/msg00073.html
Issue Tracking, Release Notes, Third Party Advisory x_refsource_confirm
https://bugzilla.redhat.com/show_bug.cgi?id=1500748
Issue Tracking, Release Notes, Vendor Advisory x_refsource_confirm
https://docs.saltstack.com/en/latest/topics/releases/2017.7.2.html
Issue Tracking, Release Notes, Vendor Advisory x_refsource_confirm
https://docs.saltstack.com/en/latest/topics/releases/2016.11.8.html

Scores

CVSS v3 9.8
EPSS 0.0033
EPSS Percentile 56.0%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-22
Status published
Products (13)
pypi/salt 0 - 2016.3.8PyPI
saltstack/salt 2016.11
saltstack/salt 2016.11.0
saltstack/salt 2016.11.1 (3 CPE variants)
saltstack/salt 2016.11.2
saltstack/salt 2016.11.3
saltstack/salt 2016.11.4
saltstack/salt 2016.11.5
saltstack/salt 2016.11.6
saltstack/salt 2016.11.7
... and 3 more
Published Oct 24, 2017
Tracked Since Feb 18, 2026