CVE-2021-21996
- EPSS 2.74%
- Veröffentlicht 08.09.2021 15:15:12
- Zuletzt bearbeitet 21.11.2024 05:49:24
An issue was discovered in SaltStack Salt before 3003.3. A user who has control of the source, and source_hash URLs can gain full file system access as root on a salt minion.
CVE-2021-31607
- EPSS 4.55%
- Veröffentlicht 23.04.2021 06:15:07
- Zuletzt bearbeitet 21.11.2024 06:05:59
In SaltStack Salt 2016.9 through 3002.6, a command injection vulnerability exists in the snapper module that allows for local privilege escalation on a minion. The attack requires that a file is created with a pathname that is backed up by snapper, a...
CVE-2021-25315
- EPSS 0.21%
- Veröffentlicht 03.03.2021 10:15:13
- Zuletzt bearbeitet 21.11.2024 05:54:43
CWE - CWE-287: Improper Authentication vulnerability in SUSE Linux Enterprise Server 15 SP 3; openSUSE Tumbleweed allows local attackers to execute arbitrary code via salt without the need to specify valid credentials. This issue affects: SUSE Linux ...
CVE-2021-3197
- EPSS 9.93%
- Veröffentlicht 27.02.2021 05:15:14
- Zuletzt bearbeitet 21.11.2024 06:21:07
An issue was discovered in SaltStack Salt before 3002.5. The salt-api's ssh client is vulnerable to a shell injection by including ProxyCommand in an argument, or via ssh_options provided in an API request.
CVE-2021-3148
- EPSS 12.14%
- Veröffentlicht 27.02.2021 05:15:14
- Zuletzt bearbeitet 21.11.2024 06:20:59
An issue was discovered in SaltStack Salt before 3002.5. Sending crafted web requests to the Salt API can result in salt.utils.thin.gen_thin() command injection because of different handling of single versus double quotes. This is related to salt/uti...
CVE-2021-3144
- EPSS 5.48%
- Veröffentlicht 27.02.2021 05:15:14
- Zuletzt bearbeitet 21.11.2024 06:20:58
In SaltStack Salt before 3002.5, eauth tokens can be used once after expiration. (They might be used to run command against the salt master or minions.)
CVE-2021-25284
- EPSS 0.02%
- Veröffentlicht 27.02.2021 05:15:14
- Zuletzt bearbeitet 21.11.2024 05:54:40
An issue was discovered in through SaltStack Salt before 3002.5. salt.modules.cmdmod can log credentials to the info or error log level.
CVE-2021-25283
- EPSS 10.04%
- Veröffentlicht 27.02.2021 05:15:13
- Zuletzt bearbeitet 21.11.2024 05:54:40
An issue was discovered in through SaltStack Salt before 3002.5. The jinja renderer does not protect against server side template injection attacks.
CVE-2021-25282
- EPSS 90.95%
- Veröffentlicht 27.02.2021 05:15:13
- Zuletzt bearbeitet 21.11.2024 05:54:40
An issue was discovered in through SaltStack Salt before 3002.5. The salt.wheel.pillar_roots.write method is vulnerable to directory traversal.
CVE-2021-25281
- EPSS 93.85%
- Veröffentlicht 27.02.2021 05:15:13
- Zuletzt bearbeitet 21.11.2024 05:54:40
An issue was discovered in through SaltStack Salt before 3002.5. salt-api does not honor eauth credentials for the wheel_async client. Thus, an attacker can remotely run any wheel modules on the master.