Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2020-11652 β€” AI Deep Analysis Summary

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Path Traversal in SaltStack Salt. πŸ“‰ **Consequences**: Remote attackers can access **arbitrary directories** on the target system due to flawed access control in the `ClearFuncs` class.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: Incorrect Access Control. πŸ” **CWE**: Not specified in data (likely CWE-22: Path Traversal).…

Q3Who is affected? (Versions/Components)

πŸ“¦ **Affected**: SaltStack Salt. πŸ“… **Versions**: All 3000.x versions **prior to 3000.2**. πŸ–₯️ **Component**: Specifically the `salt-master` process.

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Capabilities**: πŸ“‚ Read arbitrary files (e.g., `/etc/passwd`). πŸ“€ Upload malicious files (e.g., crontabs). πŸ–₯️ **RCE**: Execute commands on Master or Minions.…

Q5Is exploitation threshold high? (Auth/Config)

⚠️ **Threshold**: **LOW**. 🌐 **Auth**: Requires network access to the Salt Master interface. πŸ“ **Config**: No complex configuration needed; the flaw is in the core `ClearFuncs` class handling.…

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ”“ **Exploit Status**: **YES**. πŸ“‚ **Public PoCs**: Multiple GitHub repositories exist (e.g., `Al1ex/CVE-2020-11652`, `limon768`).…

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: 1. Check Salt version (`salt --version`). 2. Scan for open Salt Master ports (default 4505/4506). 3. Use provided PoC scripts to test for file read access (e.g., `/etc/passwd`).…

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Fix**: **YES**. πŸ“… **Patch**: Version **3000.2** and later. πŸ“œ **Vendor Advisory**: Debian (DSA-4676), Ubuntu (USN-4459-1), SUSE (openSUSE-SU-2020:1074) have released updates. πŸ”„ **Action**: Upgrade immediately.

Q9What if no patch? (Workaround)

🚧 **Workaround**: If patching is delayed: 1. **Firewall**: Restrict access to Salt Master ports (4505/4506) to trusted IPs only. 2. **Network Segmentation**: Isolate Salt infrastructure. 3.…

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **CRITICAL**. 🚨 **Priority**: **P0**. ⚑ **Reason**: Remote Code Execution (RCE) and File Traversal are available via public PoCs. Affects critical infrastructure management tools.…