Salt before 2015.5.10 and 2015.8.x before 2015.8.8, when PAM external authentication is enabled, allows attackers to bypass the configured authentication service by passing an alternate service with a command sent to LocalClient.
{
"binaries": [
{
"binary_version": "0.17.5+ds-1ubuntu0.1~esm4",
"binary_name": "salt-common"
},
{
"binary_version": "0.17.5+ds-1ubuntu0.1~esm4",
"binary_name": "salt-master"
},
{
"binary_version": "0.17.5+ds-1ubuntu0.1~esm4",
"binary_name": "salt-minion"
},
{
"binary_version": "0.17.5+ds-1ubuntu0.1~esm4",
"binary_name": "salt-ssh"
},
{
"binary_version": "0.17.5+ds-1ubuntu0.1~esm4",
"binary_name": "salt-syndic"
}
]
}