SaltStack Salt Master/Minion Unauthenticated Remote Code Execution
Posted by deepcore on May 13, 2020 – 8:53 pm
This Metasploit module exploits unauthenticated access to the runner() and _send_pub() methods in the SaltStack Salt master’s ZeroMQ request server, for versions 2019.2.3 and earlier and 3000.1 and earlier, to execute code as root on either the master or on select minions. VMware vRealize Operations Manager versions 7.5.0 through 8.1.0 are known to be affected by the Salt vulnerabilities. Tested against SaltStack Salt 2019.2.3 and 3000.1 on Ubuntu 18.04, as well as Vulhub’s Docker image.
Post a reply
You must be logged in to post a comment.