CVE-2017-5192:
SaltStack Salt Authentication Bypass when using the local_batch client from salt-api
8.8
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.36389%
CWE
Published
5/17/2022
Updated
10/21/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
salt | pip | < 2015.8.13 | 2015.8.13 |
salt | pip | >= 2016.3.0, < 2016.3.5 | 2016.3.5 |
salt | pip | >= 2016.11.0, < 2016.11.2 | 2016.11.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the local_batch client interface in salt-api not respecting external authentication. The core execution path for batch commands (handled by LocalBatchClient.cmd_batch) and the API endpoint handler (NetapiClient.run in rest_cherrypy) are the logical points where authentication checks would normally occur. The CVE description explicitly implicates the local_batch client flow, and SaltStack's architecture places these authentication checks at the API entrypoint and client execution layer. The lack of eauth validation in these functions directly enables the bypass.