Directory traversal vulnerability in minion id validation in SaltStack Salt before 2016.11.7 and 2017.7.x before 2017.7.1 allows remote minions with incorrect credentials to authenticate to a master via a crafted minion ID.
{
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
"binaries": [
{
"binary_version": "0.17.5+ds-1ubuntu0.1~esm1",
"binary_name": "salt-common"
},
{
"binary_version": "0.17.5+ds-1ubuntu0.1~esm1",
"binary_name": "salt-master"
},
{
"binary_version": "0.17.5+ds-1ubuntu0.1~esm1",
"binary_name": "salt-minion"
},
{
"binary_version": "0.17.5+ds-1ubuntu0.1~esm1",
"binary_name": "salt-ssh"
},
{
"binary_version": "0.17.5+ds-1ubuntu0.1~esm1",
"binary_name": "salt-syndic"
}
]
}
{
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
"binaries": [
{
"binary_version": "2015.8.8+ds-1ubuntu0.1+esm1",
"binary_name": "salt-api"
},
{
"binary_version": "2015.8.8+ds-1ubuntu0.1+esm1",
"binary_name": "salt-cloud"
},
{
"binary_version": "2015.8.8+ds-1ubuntu0.1+esm1",
"binary_name": "salt-common"
},
{
"binary_version": "2015.8.8+ds-1ubuntu0.1+esm1",
"binary_name": "salt-master"
},
{
"binary_version": "2015.8.8+ds-1ubuntu0.1+esm1",
"binary_name": "salt-minion"
},
{
"binary_version": "2015.8.8+ds-1ubuntu0.1+esm1",
"binary_name": "salt-proxy"
},
{
"binary_version": "2015.8.8+ds-1ubuntu0.1+esm1",
"binary_name": "salt-ssh"
},
{
"binary_version": "2015.8.8+ds-1ubuntu0.1+esm1",
"binary_name": "salt-syndic"
}
]
}