Miggo Logo

CVE-2017-7893: SaltStack Salt allows compromised salt-minions to impersonate the salt-master

9.8

CVSS Score
3.0

Basic Information

EPSS Score
0.64719%
CWE
-
Published
5/13/2022
Updated
10/26/2024
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
saltpip< 2016.3.62016.3.6

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from inadequate authentication checks in two critical areas: 1) Cryptographic signature verification (salt.crypt.verify_signature) likely failed to properly validate() the master's identity, allowing minions to forge commands. 2) The transport layer (salt.transport.Channel) may have accepted messages from unauthorized sources as master commands. These weaknesses combined would let a compromised minion impersonate the master by bypassing cryptographic authentication and exploiting the trust relationship in the communication channel.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

In S*ltSt**k S*lt ***or* ****.*.*, *ompromis** s*lt-minions **n imp*rson*t* t** s*lt-m*st*r.

Reasoning

T** vuln*r**ility st*ms *rom in***qu*t* *ut**nti**tion ****ks in two *riti**l *r**s: *) *rypto*r*p*i* si*n*tur* v*ri*i**tion (`s*lt.*rypt.v*ri*y_si*n*tur*`) lik*ly **il** to prop*rly `v*li**t*()` t** m*st*r's i**ntity, *llowin* minions to *or** *omm*