logo

CVE-2022-22967 salt

Package

Manager: pip
Name: salt
Vulnerable Version: >=0 <3002.9 || >=3003.0 <3003.5 || >=3004.0 <3004.2

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00444 pctl0.62515

Details

Salt's PAM auth fails to reject locked accounts An issue was discovered in SaltStack Salt in versions before 3002.9, 3003.5, 3004.2. PAM auth fails to reject locked accounts, which allows a previously authorized user whose account is locked still run Salt commands when their account is locked. This affects both local shell accounts with an active session and salt-api users that authenticate via PAM eauth.

Metadata

Created: 2022-06-25T07:21:19Z
Modified: 2024-10-26T22:51:47Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/06/GHSA-fpxm-fprw-6hxj/GHSA-fpxm-fprw-6hxj.json
CWE IDs: ["CWE-863"]
Alternative ID: GHSA-fpxm-fprw-6hxj
Finding: F006
Auto approve: 1