Salt before 2015.5.10 and 2015.8.x before 2015.8.8, when PAM external authentication is enabled, allows attackers to bypass the configured authentication service by passing an alternate service with a command sent to LocalClient.
{ "availability": "No subscription required", "binaries": [ { "binary_name": "salt-api", "binary_version": "2015.8.8+ds-1" }, { "binary_name": "salt-cloud", "binary_version": "2015.8.8+ds-1" }, { "binary_name": "salt-common", "binary_version": "2015.8.8+ds-1" }, { "binary_name": "salt-doc", "binary_version": "2015.8.8+ds-1" }, { "binary_name": "salt-master", "binary_version": "2015.8.8+ds-1" }, { "binary_name": "salt-minion", "binary_version": "2015.8.8+ds-1" }, { "binary_name": "salt-proxy", "binary_version": "2015.8.8+ds-1" }, { "binary_name": "salt-ssh", "binary_version": "2015.8.8+ds-1" }, { "binary_name": "salt-syndic", "binary_version": "2015.8.8+ds-1" } ] }