CVE-2021-22004: Improper Authentication in SaltStack Salt
6.4
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.27513%
CWE
Published
5/24/2022
Updated
10/26/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
salt | pip | < 3003.3 | 3003.3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability explicitly describes the installer's improper handling of a pre-existing C:\salt\conf directory. While no specific function names are provided in the available data, the core issue lies in the installer's unconditional acceptance of this directory. In Windows installer scripts (like PowerShell modules or NSIS scripts), there would logically be a code path that checks for existing configurations and decides whether to overwrite/preserve them. This logic would lack proper validation
or sanitization, making it the vulnerable component. The confidence is high because the described behavior directly maps to installer configuration-handling routines, even without explicit function names from commit diffs.