An issue was discovered in SaltStack Salt in versions before 3002.9, 3003.5, 3004.2. PAM auth fails to reject locked accounts, which allows a previously authorized user whose account is locked still run Salt commands when their account is locked. This affects both local shell accounts with an active session and salt-api users that authenticate via PAM eauth.
References
- https://nvd.nist.gov/vuln/detail/CVE-2022-22967
- https://github.com/pypa/advisory-database/tree/main/vulns/salt/PYSEC-2022-210.yaml
- https://repo.saltproject.io/
- https://saltproject.io/security_announcements/salt-security-advisory-release-june-21st-2022/,
- https://github.com/advisories/GHSA-fpxm-fprw-6hxj