{"id":"CVE-2020-28243","details":"An issue was discovered in SaltStack Salt before 3002.5. The minion's restartcheck is vulnerable to command injection via a crafted process name. This allows for a local privilege escalation by any user able to create a files on the minion in a non-blacklisted directory.","aliases":["GHSA-phhw-3wc9-8q75","PYSEC-2021-73"],"modified":"2026-03-15T15:11:47.239700Z","published":"2021-02-27T05:15:13.630Z","related":["SUSE-RU-2021:0632-1","SUSE-RU-2021:0633-1","SUSE-SU-2021:0624-1","SUSE-SU-2021:0626-1","SUSE-SU-2021:0627-1","SUSE-SU-2021:0628-1","SUSE-SU-2021:0630-1","SUSE-SU-2021:0631-1","SUSE-SU-2021:0914-1","SUSE-SU-2021:0915-1","SUSE-SU-2021:14650-1","SUSE-SU-2021:1690-1","openSUSE-SU-2021:0347-1","openSUSE-SU-2024:11364-1"],"references":[{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202310-22"},{"type":"ADVISORY","url":"https://www.debian.org/security/2021/dsa-5011"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2021/11/msg00009.html"},{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7GRVZ5WAEI3XFN2BDTL6DDXFS5HYSDVB/"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2022/01/msg00000.html"},{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FUGLOJ6NXLCIFRD2JTXBYQEMAEF2B6XH/"},{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YOGNT2XWPOYV7YT75DN7PS4GIYWFKOK5/"},{"type":"ADVISORY","url":"https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202103-01"},{"type":"EVIDENCE","url":"https://sec.stealthcopter.com/cve-2020-28243/"},{"type":"EVIDENCE","url":"https://github.com/stealthcopter/CVE-2020-28243"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/saltstack/salt","events":[{"introduced":"0"},{"fixed":"c3d2c4eaaef3f26e58d2f676c7456987af866155"},{"introduced":"aaa6f7d80a61637353c9af1229d2754df52ee482"},{"fixed":"e8309a6bbf12b8b803fdbd410e21b8b03d8b5264"},{"introduced":"11acecc43e2c2e4e9a0e73d76b46b035afe8d538"},{"fixed":"7d79ea784414fc73afc85086ce912fda83f3497d"},{"introduced":"a04ab86da15215c01610183e60f4a2af6131f475"},{"fixed":"24c4ae9c2148a0f48e4f28c848a5011e18b57b7a"},{"introduced":"11d176ff1b3c72a529a641c780de6bf70b792253"},{"fixed":"8cf08bd7be0110f965ca768b2e590f68e6b0a519"},{"introduced":"e5cd6086a75818885f2bd5bee3d7da3b2c07b110"},{"fixed":"a10f0146a42338e04a4e2d8066f1ee99571c9fbd"},{"introduced":"d15dce349611a970fff8d3ffb462ef95ce7b2360"},{"fixed":"302776b03c38514667e2292ef3553b6442ee776d"},{"introduced":"0ca04ffbebb9daeb8469a6e80d868b8a6524bd99"},{"fixed":"5da2de946d243b538926f4992a1ee9a9d865e62d"},{"introduced":"d792c0ef3a2c253e7928e2bd55ef77fbf7144d0b"},{"fixed":"56d1cab54def97b417f66aadf724eaffc3ee86a9"},{"introduced":"9adc2214c3bb7c68f820f7bd5fe5e132b7b3fbc9"},{"fixed":"c77785846af50970f4d6c69234d1a9d2a4e0020b"},{"introduced":"b95213ec903402f25c1e0aeb3990fe8452ab63ce"},{"fixed":"8e94b352cc183aee9118e03a52e6eebb89469557"},{"introduced":"998c382f5f2c3b4cbf7d96aa6913ada6993909b3"},{"fixed":"53efaab6403a751e6e74dcf53e8c6d5be05b0515"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"2015.8.10"},{"introduced":"2015.8.11"},{"fixed":"2015.8.13"},{"introduced":"2016.3.0"},{"fixed":"2016.3.4"},{"introduced":"2016.3.5"},{"fixed":"2016.3.6"},{"introduced":"2016.3.7"},{"fixed":"2016.3.8"},{"introduced":"2016.11.4"},{"fixed":"2016.11.5"},{"introduced":"2016.11.7"},{"fixed":"2016.11.10"},{"introduced":"2019.2.0"},{"fixed":"2019.2.5"},{"introduced":"2019.2.6"},{"fixed":"2019.2.8"},{"introduced":"3000"},{"fixed":"3000.6"},{"introduced":"3001"},{"fixed":"3001.4"},{"introduced":"3002"},{"fixed":"3002.5"}]}}],"versions":["v2015.8.11","v2015.8.12"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"2016.3.9"},{"fixed":"2016.11.3"}]},{"events":[{"introduced":"2017.5.0"},{"fixed":"2017.7.8"}]},{"events":[{"introduced":"2018.2.0"},{"last_affected":"2018.3.5"}]},{"events":[{"introduced":"0"},{"last_affected":"32"}]},{"events":[{"introduced":"0"},{"last_affected":"33"}]},{"events":[{"introduced":"0"},{"last_affected":"34"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0"}]},{"events":[{"introduced":"0"},{"last_affected":"11.0"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-28243.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}