When using the localbatch client from salt-api in SaltStack Salt before 2015.8.13, 2016.3.x before 2016.3.5, and 2016.11.x before 2016.11.2, external authentication is not respected, enabling all authentication to be bypassed. The LocalClient.cmdbatch() method client does not accept external_auth credentials and so access to it from salt-api has been removed for now. This vulnerability allows code execution for already-authenticated users and is only in effect when running salt-api as the root user.
{ "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "salt-api", "binary_version": "2017.7.4+dfsg1-1" }, { "binary_name": "salt-cloud", "binary_version": "2017.7.4+dfsg1-1" }, { "binary_name": "salt-common", "binary_version": "2017.7.4+dfsg1-1" }, { "binary_name": "salt-doc", "binary_version": "2017.7.4+dfsg1-1" }, { "binary_name": "salt-master", "binary_version": "2017.7.4+dfsg1-1" }, { "binary_name": "salt-minion", "binary_version": "2017.7.4+dfsg1-1" }, { "binary_name": "salt-proxy", "binary_version": "2017.7.4+dfsg1-1" }, { "binary_name": "salt-ssh", "binary_version": "2017.7.4+dfsg1-1" }, { "binary_name": "salt-syndic", "binary_version": "2017.7.4+dfsg1-1" } ] }