An issue was discovered in SaltStack Salt in versions before 3002.9, 3003.5, 3004.2. PAM auth fails to reject locked accounts, which allows a previously authorized user whose account is locked still run Salt commands when their account is locked. This affects both local shell accounts with an active session and salt-api users that authenticate via PAM eauth.
References
Link | Resource |
---|---|
https://repo.saltproject.io/ | Product Vendor Advisory |
https://saltproject.io/security_announcements/salt-security-advisory-release-june-21st-2022/%2C | Broken Link |
https://security.gentoo.org/glsa/202310-22 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Dec 2023, 18:44
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
30 Jun 2022, 19:24
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:* | |
CWE | CWE-863 | |
CVSS |
v2 : v3 : |
v2 : 6.5
v3 : 8.8 |
References | (MISC) https://saltproject.io/security_announcements/salt-security-advisory-release-june-21st-2022/, - Vendor Advisory | |
References | (MISC) https://repo.saltproject.io/ - Product, Vendor Advisory |
23 Jun 2022, 17:19
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-06-23 17:15
Updated : 2024-02-04 22:29
NVD link : CVE-2022-22967
Mitre link : CVE-2022-22967
CVE.ORG link : CVE-2022-22967
JSON object : View
Products Affected
saltstack
- salt
CWE
CWE-863
Incorrect Authorization