CVE-2017-7893: SaltStack Salt allows compromised salt-minions to impersonate the salt-master
9.8
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.64719%
CWE
-
Published
5/13/2022
Updated
10/26/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
salt | pip | < 2016.3.6 | 2016.3.6 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from inadequate authentication checks in two critical areas: 1) Cryptographic signature verification (salt.crypt.verify_signature
) likely failed to properly validate()
the master's identity, allowing minions to forge commands. 2) The transport layer (salt.transport.Channel
) may have accepted messages from unauthorized sources as master commands. These weaknesses combined would let a compromised minion impersonate the master by bypassing cryptographic authentication and exploiting the trust relationship in the communication channel.