Saltstack

Salt

52 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 2.74%
  • Veröffentlicht 08.09.2021 15:15:12
  • Zuletzt bearbeitet 21.11.2024 05:49:24

An issue was discovered in SaltStack Salt before 3003.3. A user who has control of the source, and source_hash URLs can gain full file system access as root on a salt minion.

Exploit
  • EPSS 4.55%
  • Veröffentlicht 23.04.2021 06:15:07
  • Zuletzt bearbeitet 21.11.2024 06:05:59

In SaltStack Salt 2016.9 through 3002.6, a command injection vulnerability exists in the snapper module that allows for local privilege escalation on a minion. The attack requires that a file is created with a pathname that is backed up by snapper, a...

  • EPSS 0.21%
  • Veröffentlicht 03.03.2021 10:15:13
  • Zuletzt bearbeitet 21.11.2024 05:54:43

CWE - CWE-287: Improper Authentication vulnerability in SUSE Linux Enterprise Server 15 SP 3; openSUSE Tumbleweed allows local attackers to execute arbitrary code via salt without the need to specify valid credentials. This issue affects: SUSE Linux ...

  • EPSS 9.93%
  • Veröffentlicht 27.02.2021 05:15:14
  • Zuletzt bearbeitet 21.11.2024 06:21:07

An issue was discovered in SaltStack Salt before 3002.5. The salt-api's ssh client is vulnerable to a shell injection by including ProxyCommand in an argument, or via ssh_options provided in an API request.

  • EPSS 12.14%
  • Veröffentlicht 27.02.2021 05:15:14
  • Zuletzt bearbeitet 21.11.2024 06:20:59

An issue was discovered in SaltStack Salt before 3002.5. Sending crafted web requests to the Salt API can result in salt.utils.thin.gen_thin() command injection because of different handling of single versus double quotes. This is related to salt/uti...

  • EPSS 5.48%
  • Veröffentlicht 27.02.2021 05:15:14
  • Zuletzt bearbeitet 21.11.2024 06:20:58

In SaltStack Salt before 3002.5, eauth tokens can be used once after expiration. (They might be used to run command against the salt master or minions.)

  • EPSS 0.02%
  • Veröffentlicht 27.02.2021 05:15:14
  • Zuletzt bearbeitet 21.11.2024 05:54:40

An issue was discovered in through SaltStack Salt before 3002.5. salt.modules.cmdmod can log credentials to the info or error log level.

  • EPSS 10.04%
  • Veröffentlicht 27.02.2021 05:15:13
  • Zuletzt bearbeitet 21.11.2024 05:54:40

An issue was discovered in through SaltStack Salt before 3002.5. The jinja renderer does not protect against server side template injection attacks.

Exploit
  • EPSS 90.95%
  • Veröffentlicht 27.02.2021 05:15:13
  • Zuletzt bearbeitet 21.11.2024 05:54:40

An issue was discovered in through SaltStack Salt before 3002.5. The salt.wheel.pillar_roots.write method is vulnerable to directory traversal.

Exploit
  • EPSS 93.85%
  • Veröffentlicht 27.02.2021 05:15:13
  • Zuletzt bearbeitet 21.11.2024 05:54:40

An issue was discovered in through SaltStack Salt before 3002.5. salt-api does not honor eauth credentials for the wheel_async client. Thus, an attacker can remotely run any wheel modules on the master.