{"id":"CVE-2020-11652","details":"An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2. The salt-master process ClearFuncs class allows access to some methods that improperly sanitize paths. These methods allow arbitrary directory access to authenticated users.","aliases":["GHSA-vp49-2g4r-m3x3","PYSEC-2020-103"],"modified":"2026-04-11T12:24:17.078663Z","published":"2020-04-30T17:15:12.190Z","related":["SUSE-SU-2020:1147-1","SUSE-SU-2020:1150-1","SUSE-SU-2020:1151-1","SUSE-SU-2020:1392-1","SUSE-SU-2020:1715-1","SUSE-SU-2020:1718-1","SUSE-SU-2020:1971-1","SUSE-SU-2020:1973-1","SUSE-SU-2020:1974-1","SUSE-SU-2021:2105-1","SUSE-SU-2021:2106-1","openSUSE-SU-2020:0564-1","openSUSE-SU-2020:1074-1","openSUSE-SU-2021:0899-1","openSUSE-SU-2021:2106-1"],"database_specific":{"unresolved_ranges":[{"extracted_events":[{"last_affected":"7.1.3"},{"introduced":"8.0.0"},{"last_affected":"8.2.6"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:blackberry:workspaces_server:*:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"9.1.0"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:blackberry:workspaces_server:9.1.0:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"7.5.0"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:vmware:application_remote_collector:7.5.0:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"8.0.0"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:vmware:application_remote_collector:8.0.0:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"16.04"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"},{"extracted_events":[{"last_affected":"18.04"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"extracted_events":[{"last_affected":"10.0"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"8.0"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"9.0"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"15.1"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"}]},"references":[{"type":"WEB","url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-11652"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00047.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00070.html"},{"type":"ADVISORY","url":"http://packetstormsecurity.com/files/157560/Saltstack-3000.1-Remote-Code-Execution.html"},{"type":"ADVISORY","url":"http://support.blackberry.com/kb/articleDetail?articleNumber=000063758"},{"type":"ADVISORY","url":"http://www.vmware.com/security/advisories/VMSA-2020-0009.html"},{"type":"ADVISORY","url":"https://docs.saltstack.com/en/latest/topics/releases/2019.2.4.html"},{"type":"ADVISORY","url":"https://github.com/saltstack/salt/blob/v3000.2_docs/doc/topics/releases/3000.2.rst"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2020/05/msg00027.html"},{"type":"ADVISORY","url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-salt-2vx545AG"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4459-1/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2020/dsa-4676"},{"type":"EVIDENCE","url":"http://packetstormsecurity.com/files/157678/SaltStack-Salt-Master-Minion-Unauthenticated-Remote-Code-Execution.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/saltstack/salt","events":[{"introduced":"0"},{"fixed":"72df4dd40305bde8838567e568e324e3715930d5"},{"introduced":"9adc2214c3bb7c68f820f7bd5fe5e132b7b3fbc9"},{"fixed":"d234429aba719e139cac45db0104bf6c53cfd4ea"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"fixed":"2019.2.4"},{"introduced":"3000"},{"fixed":"3000.2"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*"}}],"versions":["v0.10.0","v0.10.1","v0.10.2","v0.10.3","v0.10.4","v0.10.5","v0.11.0","v0.12.0","v0.13.0","v0.14.0","v0.15.0","v0.16","v0.17","v0.6.0","v0.7.0","v0.8.0","v0.8.7","v0.8.9","v0.9.0","v0.9.1","v0.9.2","v0.9.3","v0.9.9","v2014.1","v2014.7","v2015.2","v2015.5","v2015.8","v2016.11","v2016.3","v2016.9","v2017.5","v2017.7","v2018.11","v2018.2","v2018.3","v2019.2","v2019.2.1","v2019.2.1rc1","v2019.2.2","v2019.2.3","v2019.2.3_docs","v2019.2.4","v3000.1","v3000.2","v3000_docs"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-11652.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}]}