{"id":"CVE-2020-11651","details":"An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2. The salt-master process ClearFuncs class does not properly validate method calls. This allows a remote user to access some methods without authentication. These methods can be used to retrieve user tokens from the salt master and/or run arbitrary commands on salt minions.","aliases":["GHSA-pjhf-vpx3-33r3","PYSEC-2020-102"],"modified":"2026-05-18T05:50:51.384980344Z","published":"2020-04-30T17:15:12.143Z","related":["SUSE-SU-2020:1147-1","SUSE-SU-2020:1150-1","SUSE-SU-2020:1151-1","SUSE-SU-2020:1392-1","SUSE-SU-2020:1715-1","SUSE-SU-2020:1718-1","SUSE-SU-2020:1971-1","SUSE-SU-2020:1973-1","SUSE-SU-2020:1974-1","SUSE-SU-2021:2105-1","SUSE-SU-2021:2106-1","openSUSE-SU-2020:0564-1","openSUSE-SU-2020:1074-1","openSUSE-SU-2021:0899-1","openSUSE-SU-2021:2106-1","openSUSE-SU-2024:11364-1"],"database_specific":{"unresolved_ranges":[{"extracted_events":[{"last_affected":"16.04"},{"last_affected":"18.04"}],"vendor_product":"canonical:ubuntu_linux","source":"CPE_FIELD","cpes":["cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"]},{"extracted_events":[{"last_affected":"8.0"},{"last_affected":"9.0"},{"last_affected":"10.0"}],"vendor_product":"debian:debian_linux","source":"CPE_FIELD","cpes":["cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"]},{"extracted_events":[{"last_affected":"15.1"}],"vendor_product":"opensuse:leap","source":"CPE_FIELD","cpes":["cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"]},{"extracted_events":[{"last_affected":"7.5.0"},{"last_affected":"8.0.0"}],"vendor_product":"vmware:application_remote_collector","source":"CPE_FIELD","cpes":["cpe:2.3:a:vmware:application_remote_collector:7.5.0:*:*:*:*:*:*:*","cpe:2.3:a:vmware:application_remote_collector:8.0.0:*:*:*:*:*:*:*"]}]},"references":[{"type":"WEB","url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-11651"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00047.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00070.html"},{"type":"ADVISORY","url":"http://www.vmware.com/security/advisories/VMSA-2020-0009.html"},{"type":"ADVISORY","url":"https://docs.saltstack.com/en/latest/topics/releases/2019.2.4.html"},{"type":"ADVISORY","url":"https://github.com/saltstack/salt/blob/v3000.2_docs/doc/topics/releases/3000.2.rst"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2020/05/msg00027.html"},{"type":"ADVISORY","url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-salt-2vx545AG"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4459-1/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2020/dsa-4676"},{"type":"EVIDENCE","url":"http://packetstormsecurity.com/files/157560/Saltstack-3000.1-Remote-Code-Execution.html"},{"type":"EVIDENCE","url":"http://packetstormsecurity.com/files/157678/SaltStack-Salt-Master-Minion-Unauthenticated-Remote-Code-Execution.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/saltstack/salt","events":[{"introduced":"0"},{"fixed":"72df4dd40305bde8838567e568e324e3715930d5"},{"introduced":"9adc2214c3bb7c68f820f7bd5fe5e132b7b3fbc9"},{"fixed":"d234429aba719e139cac45db0104bf6c53cfd4ea"}],"database_specific":{"cpe":"cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"introduced":"0"},{"fixed":"2019.2.4"},{"introduced":"3000"},{"fixed":"3000.2"}]}}],"versions":["v3000.2","v2019.2.4","v3000.1","v2019.2.3_docs","v3000_docs","v2019.2.3","v2019.2.2","v2019.2.1","v2019.2.1rc1","v2019.2","v2018.11","v2017.7","v2017.5","v2018.3","v2018.2","v2016.9","v2016.11","v2016.3","v2015.8","v2015.5","v2015.2","v2014.7","v2014.1","v0.17","v0.16","v0.15.0","v0.14.0","v0.13.0","v0.12.0","v0.11.0","v0.10.5","v0.10.4","v0.10.3","v0.10.2","v0.10.1","v0.10.0","v0.9.9","v0.9.3","v0.9.2","v0.9.1","v0.9.0","v0.8.9","v0.8.7","v0.8.0","v0.7.0","v0.6.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-11651.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}