Miggo Logo

CVE-2021-21996:
Exposure of Resource to Wrong Sphere in salt

7.5

CVSS Score

Basic Information

EPSS Score
-
Published
11/21/2021
Updated
10/22/2024
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
saltpip>= 0, < 3003.33003.3

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability (CWE-668) stems from improper validation of user-controlled 'source' and 'source_hash' parameters. The primary function 'salt.fileclient.Client.get_file' is directly responsible for retrieving files from specified sources, and its failure to restrict protocols (e.g., allowing 'file://' URIs) would permit local file access. The 'salt.utils.http.query' function is implicated in fetching external resources, and insufficient validation here could allow bypassing security checks. While the exact patch details are unavailable, the functions' roles in handling URLs and file retrieval align with the described attack vector. Confidence is high for 'get_file' due to its core role, and medium for 'http.query' due to indirect involvement.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*n issu* w*s *is*ov*r** in S*ltSt**k S*lt ***or* ****.*. * us*r w*o **s *ontrol o* t** sour**, *n* sour**_**s* URLs **n **in *ull *il* syst*m ****ss *s root on * s*lt minion.

Reasoning

T** vuln*r**ility (*W*-***) st*ms *rom improp*r v*li**tion o* us*r-*ontroll** 'sour**' *n* 'sour**_**s*' p*r*m*t*rs. T** prim*ry *un*tion 's*lt.*il**li*nt.*li*nt.**t_*il*' is *ir**tly r*sponsi*l* *or r*tri*vin* *il*s *rom sp**i*i** sour**s, *n* its *