Rapid7 Vulnerability & Exploit Database

SaltStack Salt REST API Arbitrary Command Execution

Back to Search

SaltStack Salt REST API Arbitrary Command Execution

Disclosed
11/03/2020
Created
11/12/2020

Description

This module exploits an authentication bypass and command injection in SaltStack Salt's REST API to execute commands as the root user. The following versions have received a patch: 2015.8.10, 2015.8.13, 2016.3.4, 2016.3.6, 2016.3.8, 2016.11.3, 2016.11.6, 2016.11.10, 2017.7.4, 2017.7.8, 2018.3.5, 2019.2.5, 2019.2.6, 3000.3, 3000.4, 3001.1, 3001.2, and 3002. Tested against 2019.2.3 from Vulhub and 3002 on Ubuntu 20.04.1.

Author(s)

  • KPC
  • wvu <wvu@metasploit.com>

Platform

Linux,Unix

Architectures

cmd, x86, x64

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use exploit/linux/http/saltstack_salt_api_cmd_exec
msf exploit(saltstack_salt_api_cmd_exec) > show targets
    ...targets...
msf exploit(saltstack_salt_api_cmd_exec) > set TARGET < target-id >
msf exploit(saltstack_salt_api_cmd_exec) > show options
    ...show and set options...
msf exploit(saltstack_salt_api_cmd_exec) > exploit

Time is precious, so I don’t want to do something manually that I can automate. Leveraging the Metasploit Framework when automating any task keeps us from having to re-create the wheel as we can use the existing libraries and focus our efforts where it matters.

– Jim O’Gorman | President, Offensive Security

;