Miggo Logo

CVE-2021-22004: Improper Authentication in SaltStack Salt

6.4

CVSS Score
3.1

Basic Information

EPSS Score
0.27513%
Published
5/24/2022
Updated
10/26/2024
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
saltpip< 3003.33003.3

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability explicitly describes the installer's improper handling of a pre-existing C:\salt\conf directory. While no specific function names are provided in the available data, the core issue lies in the installer's unconditional acceptance of this directory. In Windows installer scripts (like PowerShell modules or NSIS scripts), there would logically be a code path that checks for existing configurations and decides whether to overwrite/preserve them. This logic would lack proper validation or sanitization, making it the vulnerable component. The confidence is high because the described behavior directly maps to installer configuration-handling routines, even without explicit function names from commit diffs.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*n issu* w*s *is*ov*r** in S*ltSt**k S*lt ***or* ****.*. T** s*lt minion inst*ll*r will ****pt *n* us* * minion *on*i* *il* *t *:\s*lt\*on* i* t**t *il* is in pl*** ***or* t** inst*ll*r is run. T*is *llows *or * m*li*ious **tor to su*v*rt t** prop*r

Reasoning

T** vuln*r**ility *xpli*itly **s*ri**s t** inst*ll*r's improp*r **n*lin* o* * pr*-*xistin* *:\s*lt\*on* *ir**tory. W*il* no sp**i*i* *un*tion n*m*s *r* provi*** in t** *v*il**l* **t*, t** *or* issu* li*s in t** inst*ll*r's un*on*ition*l ****pt*n** o*