Bug 1644489 (CVE-2018-15751)

Summary: CVE-2018-15751 salt: Remote command execution and incorrect access control when using salt-api
Product: [Other] Security Response Reporter: Sam Fowler <sfowler>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: urgent Docs Contact:
Priority: urgent    
Version: unspecifiedCC: ahardin, athmanem, bleanhar, ccoleman, david-dm.murphy, dedgar, eparis, hchiramm, herlo1, itamar, jarrpa, jeff, jgoulding, jmulligan, jokerman, kramdoss, lpabon, madam, mchappel, ramkrsna, rhs-bugs, sankarshan, sisharma, ssaha, storage-qa-internal, vbellur, yozone
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: salt 2017.7.8, salt 2018.3.3 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-06-10 10:41:18 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1644490, 1644491, 1644492    
Bug Blocks: 1644495    

Description Sam Fowler 2018-10-31 02:09:27 UTC
SaltStack Salt before 2017.7.8 and 2018.3.x before 2018.3.3 allow remote attackers to bypass authentication and execute arbitrary commands via salt-api(netapi).


Upstream Changelog:

https://docs.saltstack.com/en/2017.7/topics/releases/2017.7.8.html
https://docs.saltstack.com/en/latest/topics/releases/2018.3.3.html

Comment 1 Sam Fowler 2018-10-31 02:10:12 UTC
Created heketi tracking bugs for this issue:

Affects: fedora-all [bug 1644490]


Created salt tracking bugs for this issue:

Affects: epel-all [bug 1644492]
Affects: fedora-all [bug 1644491]

Comment 2 Jason Shepherd 2018-10-31 05:21:28 UTC
Until release 1.9 of Kubernetes there where configuration files for installing Kubernetes via Saltstack included in the Kubernetes repository. However the only supported configuration management solution for OpenShift Container Platform 3.x is Ansible [2], therefore OpenShift Container Platform 3.x is not affected by this issue.