Bug 1810990 (CVE-2019-18897) - CVE-2019-18897 salt: symlink following in salt allows for privilege escalalation
Summary: CVE-2019-18897 salt: symlink following in salt allows for privilege escalalation
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2019-18897
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1810991 1810992
Blocks: 1810993
TreeView+ depends on / blocked
 
Reported: 2020-03-06 11:04 UTC by Michael Kaplan
Modified: 2021-06-09 17:31 UTC (History)
3 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in salt. A UNIX Symbolic Link (Symlink) Following vulnerability in some implementations of Linux servers allows local attackers to escalate privileges from user salt to root.
Clone Of:
Environment:
Last Closed: 2020-03-06 15:27:26 UTC
Embargoed:


Attachments (Terms of Use)

Description Michael Kaplan 2020-03-06 11:04:54 UTC
A UNIX Symbolic Link (Symlink) Following vulnerability in the packaging of salt in some implementations of Linux servers allows local attackers to escalate privileges from user salt to root.

Comment 1 Michael Kaplan 2020-03-06 11:05:31 UTC
Created salt tracking bugs for this issue:

Affects: epel-all [bug 1810992]
Affects: fedora-all [bug 1810991]

Comment 2 Michael Kaplan 2020-03-06 11:07:50 UTC
External Reference:

https://bugzilla.suse.com/show_bug.cgi?id=1157465

Comment 3 Hardik Vyas 2020-03-06 15:27:30 UTC
Statement:

Privilege escalation is due to no symlink validation check in %post script for "salt-master" where file ownership is changed to salt user. salt-master was used by Red Hat Storage Console 2 which has reached End Of Life. Red Hat Ceph Storage 2 does not use salt-master, in addition affected code is not included in the %post script for the version of salt shipped by Red Hat.


Note You need to log in before you can comment on or make changes to this bug.