Intel

AIKIDO-2024-10199

salt is vulnerable to Return of Wrong Status Code

Return of Wrong Status CodeCVE-2024-37088

20

Low Risk

This Affects:

pythonsalt
2014.1 - 3006.8
Fixed in 3006.9

TL;DR

Affected versions of the package are vulnerable to returning the wrong status code. salt-call does not fail when it encounters bad pillar data. If the master returns invalid pillar data, salt-call uses a default value from the state instead of failing. This may result in invalid states being applied or a loss of pillar integrity.

Who does this affect?

You are affected if you are using a version that falls within the vulnerable range.

Background info

salt is vulnerable to Return of Wrong Status Code in versions 2014.1 - 3006.8.

How to fix this

Upgrade the salt library to the patch version.