{"id":"PYSEC-2021-56","details":"In SaltStack Salt 2016.9 through 3002.6, a command injection vulnerability exists in the snapper module that allows for local privilege escalation on a minion. The attack requires that a file is created with a pathname that is backed up by snapper, and that the master calls the snapper.diff function (which executes popen unsafely).","aliases":["CVE-2021-31607","GHSA-hcjf-rp5h-g5h3"],"modified":"2023-11-08T04:05:50.055462Z","published":"2021-04-23T06:15:00Z","references":[{"type":"WEB","url":"https://sec.stealthcopter.com/saltstack-snapper-minion-privledge-escaltion/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LDKMAJXYFHM4USVX3H5V2GCCBGASWUSM/"},{"type":"ADVISORY","url":"https://github.com/advisories/GHSA-hcjf-rp5h-g5h3"}],"affected":[{"package":{"name":"salt","ecosystem":"PyPI","purl":"pkg:pypi/salt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"2016.11.0"},{"fixed":"3003rc1"}]}],"versions":["2016.11.0","2016.11.1","2016.11.2","2016.11.3","2016.11.4","2016.11.5","2016.11.6","2016.11.7","2016.11.8","2016.11.9","2016.11.10","2017.7.0rc1","2017.7.0","2017.7.1","2017.7.2","2017.7.3","2017.7.4","2017.7.5","2017.7.6","2017.7.7","2017.7.8","2018.3.0rc1","2018.3.0","2018.3.1","2018.3.2","2018.3.3","2018.3.4","2018.3.5","2019.2.0rc1","2019.2.0rc2","2019.2.0","2019.2.1","2019.2.2","2019.2.3","2019.2.4","2019.2.5","2019.2.6","2019.2.7","2019.2.8","3000.0.0rc1","3000.0.0rc2","3000","3000.1","3000.2","3000.3","3000.4","3000.5","3000.6","3000.7","3000.8","3000.9","3001rc1","3001","3001.1","3001.2","3001.3","3001.4","3001.5","3001.6","3001.7","3002rc1","3002","3002.1","3002.2","3002.3","3002.4","3002.5","3002.6","3001.8","3002.7","3002.8","3002.9"],"database_specific":{"source":"https://github.com/pypa/advisory-database/blob/main/vulns/salt/PYSEC-2021-56.yaml"}}],"schema_version":"1.7.3"}