CVE-2021-21996:
Exposure of Resource to Wrong Sphere in salt
7.5
CVSS ScoreBasic Information
Technical Details
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
salt | pip | >= 0, < 3003.3 | 3003.3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability (CWE-668) stems from improper validation of user-controlled 'source' and 'source_hash' parameters. The primary function 'salt.fileclient.Client.get_file' is directly responsible for retrieving files from specified sources, and its failure to restrict protocols (e.g., allowing 'file://' URIs) would permit local file access. The 'salt.utils.http.query' function is implicated in fetching external resources, and insufficient validation here could allow bypassing security checks. While the exact patch details are unavailable, the functions' roles in handling URLs and file retrieval align with the described attack vector. Confidence is high for 'get_file' due to its core role, and medium for 'http.query' due to indirect involvement.