oss-sec mailing list archives
Re: CVE request for saltstack minion identity usurpation
From: Kurt Seifried <kseifried () redhat com>
Date: Wed, 16 Oct 2013 00:20:08 -0600
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 10/15/2013 11:54 PM, Kurt Seifried wrote:
On 10/11/2013 04:26 PM, Michael Scherer wrote:Hi,While looking for saltstack issues on github, i stumbled on this pull request : https://github.com/saltstack/salt/pull/7356It seems that saltstack, a client/server configuration system ( like puppet, chef, cfengine ) allowed to have any minions ( agent on the server to be configured ) to masquerade itself as any others agents when requesting stuff from the master ( ie, main server ). While I didn't fully check, this would permit a compromised server to request data from another server, thus leading to potential informations leak ( like passwword, etc ).Can a CVE be assigned, and I will pass it to upstream on the bug report ?Ok mmcallis@ researched these and found: CVE-2013-4435 saltstack Insufficient argument validation in several modules CVE-2013-4436 saltstack MITM ssh attack on salt-ssh CVE-2013-4437 saltstack Insecure usage of a predictable directory in /tmp and on minion (CVE MERGE of two tmp issues) CVE-2013-4438 saltstack pillar.ext or qemu_nbd.clear yaml string RCE
Argh. The above are currently embargoed, I misunderstood and thought they were public (along with the following one). My apologies, especially to upstream and users of saltstack. Adding saltstack info@ to the CC (can't find a security address).
CVE-2013-4439 saltstack minion identity usurpation
- -- Kurt Seifried Red Hat Security Response Team (SRT) PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.15 (GNU/Linux) iQIcBAEBAgAGBQJSXjAYAAoJEBYNRVNeJnmTlQUQAJ2p5btZvrhosi1HbD6CX6uJ aBefrIXWWTxtuStZX9qSYhBbaKmlI3oOwgEmtJGocohnRL5zKNVyHnEftTpehaah 7d2ulGzUZNs1MSQt7YWY13A4aMda2i2DTvJrj5SNqJKQoEkmVGPbeJfbKH57olEj hxuwZB98JnW9lWpR9RiiZiCjFHiI5v7gUZyzrn5tJg1v7s0iXAE9W41SPV6H4bNi XvO1jJQEegnyxaH1s5g92t4aDSl2D0CJLBArj/ewD74NjKUts5s3t7F8O1d7gAkP xnhUsBUMLyj/yXW1t7dwMu9P0W1dupltE7Hv1gPflSUeKSBTX0BnmUmztZPW+/TK 7Yu9UeMX5IF2+z56mB2C/AukDra+GEXek7EhKc4471x6bBvpY806WqIH6922LGiE 398SxAl6Ni+8P6aqcxTyXIriPJv/Z0wzPyiSWwoI65QEBt7YdKNKzhYFzpZP4JNq 8Ka145g8uylct7T9NAGPArSLZIxttBinVxz1uGRghpQvTn+X0Q5dNHb9OKc6E/Aj bhfOXxufK0inwZtdAARgHQhIr6JnzaeGuJLtwf/FrihjWE7/m9+7e6EmlaSzhtnZ SrwKoi24xS5WMb09rHRPqnH40+xuijrPES90R/V84NadPamH1yM39W3yoTdHJC3f Vnoec4ScyFDL19mM2/n6 =nPX+ -----END PGP SIGNATURE-----
Current thread:
- CVE request for saltstack minion identity usurpation Michael Scherer (Oct 11)
- Re: CVE request for saltstack minion identity usurpation Kurt Seifried (Oct 15)
- Re: CVE request for saltstack minion identity usurpation Kurt Seifried (Oct 15)
- Re: CVE request for saltstack minion identity usurpation Kurt Seifried (Oct 18)
- Re: CVE request for saltstack minion identity usurpation Kurt Seifried (Oct 15)
- Re: CVE request for saltstack minion identity usurpation Kurt Seifried (Oct 15)
- Re: CVE request for saltstack minion identity usurpation Kurt Seifried (Oct 15)