CVE-2021-3144
- EPSS 5.48%
- Veröffentlicht 27.02.2021 05:15:14
- Zuletzt bearbeitet 21.11.2024 06:20:58
In SaltStack Salt before 3002.5, eauth tokens can be used once after expiration. (They might be used to run command against the salt master or minions.)
CVE-2021-3148
- EPSS 12.14%
- Veröffentlicht 27.02.2021 05:15:14
- Zuletzt bearbeitet 21.11.2024 06:20:59
An issue was discovered in SaltStack Salt before 3002.5. Sending crafted web requests to the Salt API can result in salt.utils.thin.gen_thin() command injection because of different handling of single versus double quotes. This is related to salt/uti...
CVE-2021-3197
- EPSS 14.33%
- Veröffentlicht 27.02.2021 05:15:14
- Zuletzt bearbeitet 21.11.2024 06:21:07
An issue was discovered in SaltStack Salt before 3002.5. The salt-api's ssh client is vulnerable to a shell injection by including ProxyCommand in an argument, or via ssh_options provided in an API request.
CVE-2020-28243
- EPSS 1.41%
- Veröffentlicht 27.02.2021 05:15:13
- Zuletzt bearbeitet 21.11.2024 05:22:30
An issue was discovered in SaltStack Salt before 3002.5. The minion's restartcheck is vulnerable to command injection via a crafted process name. This allows for a local privilege escalation by any user able to create a files on the minion in a non-b...
CVE-2020-28972
- EPSS 0.8%
- Veröffentlicht 27.02.2021 05:15:13
- Zuletzt bearbeitet 21.11.2024 05:23:24
In SaltStack Salt before 3002.5, authentication to VMware vcenter, vsphere, and esxi servers (in the vmware.py files) does not always validate the SSL/TLS certificate.
CVE-2020-35662
- EPSS 0.75%
- Veröffentlicht 27.02.2021 05:15:13
- Zuletzt bearbeitet 21.11.2024 05:27:47
In SaltStack Salt before 3002.5, when authenticating to services using certain modules, the SSL certificate is not always validated.
CVE-2021-25281
- EPSS 93.9%
- Veröffentlicht 27.02.2021 05:15:13
- Zuletzt bearbeitet 21.11.2024 05:54:40
An issue was discovered in through SaltStack Salt before 3002.5. salt-api does not honor eauth credentials for the wheel_async client. Thus, an attacker can remotely run any wheel modules on the master.
CVE-2021-25282
- EPSS 90.95%
- Veröffentlicht 27.02.2021 05:15:13
- Zuletzt bearbeitet 21.11.2024 05:54:40
An issue was discovered in through SaltStack Salt before 3002.5. The salt.wheel.pillar_roots.write method is vulnerable to directory traversal.
CVE-2021-25283
- EPSS 10.04%
- Veröffentlicht 27.02.2021 05:15:13
- Zuletzt bearbeitet 21.11.2024 05:54:40
An issue was discovered in through SaltStack Salt before 3002.5. The jinja renderer does not protect against server side template injection attacks.
CVE-2020-27618
- EPSS 0.03%
- Veröffentlicht 26.02.2021 23:15:11
- Zuletzt bearbeitet 09.06.2025 16:15:31
The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid multi-byte input sequences in IBM1364, IBM1371, IBM1388, IBM1390, and IBM1399 encodings, fails to advance the input state, which could lead to an i...