Miggo Logo

CVE-2017-5192:
SaltStack Salt Authentication Bypass when using the local_batch client from salt-api

8.8

CVSS Score
3.0

Basic Information

EPSS Score
0.36389%
Published
5/17/2022
Updated
10/21/2024
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
saltpip< 2015.8.132015.8.13
saltpip>= 2016.3.0, < 2016.3.52016.3.5
saltpip>= 2016.11.0, < 2016.11.22016.11.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from the local_batch client interface in salt-api not respecting external authentication. The core execution path for batch commands (handled by LocalBatchClient.cmd_batch) and the API endpoint handler (NetapiClient.run in rest_cherrypy) are the logical points where authentication checks would normally occur. The CVE description explicitly implicates the local_batch client flow, and SaltStack's architecture places these authentication checks at the API entrypoint and client execution layer. The lack of eauth validation in these functions directly enables the bypass.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

W**n usin* t** lo**l_**t** *li*nt *rom s*lt-*pi in S*ltSt**k S*lt ***or* ****.*.**, ****.*.x ***or* ****.*.*, *n* ****.**.x ***or* ****.**.*, *xt*rn*l *ut**nti**tion is not r*sp**t**, *n**lin* *ll *ut**nti**tion to ** *yp*ss**.

Reasoning

T** vuln*r**ility st*ms *rom t** lo**l_**t** *li*nt int*r**** in s*lt-*pi not r*sp**tin* *xt*rn*l *ut**nti**tion. T** *or* *x**ution p*t* *or **t** *omm*n*s (**n*l** *y Lo**l**t***li*nt.*m*_**t**) *n* t** *PI *n*point **n*l*r (N*t*pi*li*nt.run in r*s