Salt's on demand pillar functionality vulnerable to arbitrary command injections
Moderate severity
GitHub Reviewed
Published
Jun 13, 2025
to the GitHub Advisory Database
•
Updated Jun 13, 2025
Package
Affected versions
>= 3006.0rc1, < 3006.12
>= 3007.0rc1, < 3007.4
Patched versions
3006.12
3007.4
Description
Published by the National Vulnerability Database
Jun 13, 2025
Published to the GitHub Advisory Database
Jun 13, 2025
Reviewed
Jun 13, 2025
Last updated
Jun 13, 2025
An attacker with access to a minion key can exploit the 'on demand' pillar functionality with a specially crafted git url which could cause and arbitrary command to be run on the master with the same privileges as the master process.
References