Saltstack

Salt

52 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.13%
  • Published 13.06.2025 07:10:31
  • Last modified 10.07.2025 00:34:26

Directory traversal vulnerability in recv_file method allows arbitrary files to be written to the master cache directory.

  • EPSS 0.12%
  • Published 05.09.2023 11:15:33
  • Last modified 13.02.2025 17:16:02

Git Providers can read from the wrong environment because they get the same cache directory base name in Salt masters prior to 3005.2 or 3006.2. Anything that uses Git Providers with different environments can get garbage data or the wrong data, whic...

  • EPSS 0.11%
  • Published 05.09.2023 11:15:32
  • Last modified 13.02.2025 17:16:02

Salt masters prior to 3005.2 or 3006.2 contain a DOS in minion return. After receiving several bad packets on the request server equal to the number of worker threads, the master will become unresponsive to return requests until restarted.

Exploit
  • EPSS 1.7%
  • Published 17.02.2023 18:15:11
  • Last modified 18.03.2025 19:15:38

Buffer Overflow vulnerability in Saltstack v.3003 and before allows attacker to execute arbitrary code via the func variable in salt/salt/modules/status.py file. NOTE: this is disputed by third parties because an attacker cannot influence the eval in...

  • EPSS 0.44%
  • Published 23.06.2022 17:15:12
  • Last modified 05.05.2025 17:17:54

An issue was discovered in SaltStack Salt in versions before 3002.9, 3003.5, 3004.2. PAM auth fails to reject locked accounts, which allows a previously authorized user whose account is locked still run Salt commands when their account is locked. Thi...

  • EPSS 0.01%
  • Published 29.03.2022 17:15:15
  • Last modified 05.05.2025 17:17:54

An issue was discovered in SaltStack Salt in versions before 3002.8, 3003.4, 3004.1. When configured as a Master-of-Masters, with a publisher_acl, if a user configured in the publisher_acl targets any minion connected to the Syndic, the Salt Master i...

  • EPSS 0.08%
  • Published 29.03.2022 17:15:15
  • Last modified 05.05.2025 17:17:54

An issue was discovered in SaltStack Salt in versions before 3002.8, 3003.4, 3004.1. Job publishes and file server replies are susceptible to replay attacks, which can result in an attacker replaying job publishes causing minions to run old jobs. Fil...

  • EPSS 0.07%
  • Published 29.03.2022 17:15:15
  • Last modified 05.05.2025 17:17:54

An issue was discovered in SaltStack Salt in versions before 3002.8, 3003.4, 3004.1. A minion authentication denial of service can cause a MiTM attacker to force a minion process to stop by impersonating a master.

  • EPSS 0.09%
  • Published 29.03.2022 17:15:15
  • Last modified 21.11.2024 06:47:38

An issue was discovered in SaltStack Salt in versions before 3002.8, 3003.4, 3004.1. Salt Masters do not sign pillar data with the minion’s public key, which can result in attackers substituting arbitrary pillar data.

  • EPSS 0.09%
  • Published 08.09.2021 15:15:12
  • Last modified 21.11.2024 05:49:25

An issue was discovered in SaltStack Salt before 3003.3. The salt minion installer will accept and use a minion config file at C:\salt\conf if that file is in place before the installer is run. This allows for a malicious actor to subvert the proper ...