CVE-2020-11651
A vulnerability was found in SaltStack Salt. It has been classified as critical. Affected is the function
ClearFuncs
. The manipulation with an unknown input leads to a input validation vulnerability. CWE is classifying the issue as CWE-20. The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly. This is going to have an impact on confidentiality, integrity, and availability.
Exploit
Exploit located online
SaltStack has a very interesting architecture, and its message bus in done over ZeroMQ.
This explains the presence of ZMTP servers on the target ports
4505
and 4506
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/twiggy]
└─$ git clone https://github.com/jasperla/CVE-2020-11651-poc ; python3 -m venv CVE-2020-11651-poc/.venv ; source CVE-2020-11651-poc/.venv/bin/activate
Cloning into 'CVE-2020-11651-poc'...
remote: Enumerating objects: 30, done.
remote: Counting objects: 100% (30/30), done.
remote: Compressing objects: 100% (20/20), done.
remote: Total 30 (delta 12), reused 26 (delta 10), pack-reused 0 (from 0)
Receiving objects: 100% (30/30), 8.61 KiB | 8.61 MiB/s, done.
Resolving deltas: 100% (12/12), done.
┌──(.venv)─(kali㉿kali)-[~/PEN-200/PG_PRACTICE/twiggy]
└─$ pip3 install salt
Setting up a virtual environment for the exploit script