CVE-2020-28243: SaltStack Salt command injection via a crafted process name
7.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.82321%
CWE
Published
5/24/2022
Updated
10/22/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| salt | pip | < 2015.8.13 | 2015.8.13 |
| salt | pip | >= 2016.3.0, < 2016.11.5 | 2016.11.5 |
| salt | pip | >= 2016.11.7, < 2016.11.10 | 2016.11.10 |
| salt | pip | >= 2017.5.0, < 2017.7.8 | 2017.7.8 |
| salt | pip | >= 2018.2.0, <= 2018.3.5 | |
| salt | pip | >= 2019.2.0, < 2019.2.8 | 2019.2.8 |
| salt | pip | >= 3000, < 3000.7 | 3000.7 |
| salt | pip | >= 3001, < 3001.5 | 3001.5 |
| salt | pip | >= 3002, < 3002.3 | 3002.3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability occurs in the 'restartcheck' module where process names are used unsafely in shell commands. The code uses 'subprocess.Popen' with 'shell=True' and concatenates the 'package' variable (derived from process names) into the command string without proper sanitization. This allows attackers to inject arbitrary commands via specially crafted process names. The exploit references and SaltStack's own patching notes confirm this function as the attack vector.