module

SaltStack Salt REST API Arbitrary Command Execution

Disclosed
2020-11-03
Created
2020-11-12

Description

This module exploits an authentication bypass and command injection in
SaltStack Salt's REST API to execute commands as the root user.

The following versions have received a patch: 2015.8.10, 2015.8.13,
2016.3.4, 2016.3.6, 2016.3.8, 2016.11.3, 2016.11.6, 2016.11.10,
2017.7.4, 2017.7.8, 2018.3.5, 2019.2.5, 2019.2.6, 3000.3, 3000.4,
3001.1, 3001.2, and 3002.

Tested against 2019.2.3 from Vulhub and 3002 on Ubuntu 20.04.1.

Authors

KPC
wvu wvu@metasploit.com

Platform

Linux,Unix

Architectures

cmd, x86, x64

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use exploit/linux/http/saltstack_salt_api_cmd_exec
msf exploit(saltstack_salt_api_cmd_exec) > show targets
...targets...
msf exploit(saltstack_salt_api_cmd_exec) > set TARGET < target-id >
msf exploit(saltstack_salt_api_cmd_exec) > show options
...show and set options...
msf exploit(saltstack_salt_api_cmd_exec) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.