9.1

CVE-2021-3144

In SaltStack Salt before 3002.5, eauth tokens can be used once after expiration. (They might be used to run command against the salt master or minions.)

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
SaltstackSalt Version < 2015.8.10
SaltstackSalt Version >= 2015.8.11 < 2015.8.13
SaltstackSalt Version >= 2016.3.0 < 2016.3.4
SaltstackSalt Version >= 2016.3.5 < 2016.3.6
SaltstackSalt Version >= 2016.3.7 < 2016.3.8
SaltstackSalt Version >= 2016.3.9 < 2016.11.3
SaltstackSalt Version >= 2016.11.4 < 2016.11.5
SaltstackSalt Version >= 2016.11.7 < 2016.11.10
SaltstackSalt Version >= 2017.5.0 < 2017.7.8
SaltstackSalt Version >= 2018.2.0 <= 2018.3.5
SaltstackSalt Version >= 2019.2.0 < 2019.2.5
SaltstackSalt Version >= 2019.2.6 < 2019.2.8
SaltstackSalt Version >= 3000 < 3000.6
SaltstackSalt Version >= 3001 < 3001.4
SaltstackSalt Version >= 3002 < 3002.5
FedoraprojectFedora Version32
FedoraprojectFedora Version33
FedoraprojectFedora Version34
DebianDebian Linux Version9.0
DebianDebian Linux Version10.0
DebianDebian Linux Version11.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 5.48% 0.898
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 9.1 3.9 5.2
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
nvd@nist.gov 7.5 10 6.4
AV:N/AC:L/Au:N/C:P/I:P/A:P
CWE-613 Insufficient Session Expiration

According to WASC, "Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization."