Critical severity9.8NVD Advisory· Published Aug 23, 2017· Updated May 13, 2026
CVE-2017-12791
CVE-2017-12791
Description
Directory traversal vulnerability in minion id validation in SaltStack Salt before 2016.11.7 and 2017.7.x before 2017.7.1 allows remote minions with incorrect credentials to authenticate to a master via a crafted minion ID.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
saltPyPI | < 2016.11.7 | 2016.11.7 |
saltPyPI | >= 2017.7.0, < 2017.7.1 | 2017.7.1 |
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
9- bugs.debian.org/cgi-bin/bugreport.cginvdIssue TrackingPatchThird Party AdvisoryWEB
- bugzilla.redhat.com/show_bug.cginvdIssue TrackingPatchThird Party AdvisoryWEB
- docs.saltstack.com/en/2016.11/topics/releases/2016.11.7.htmlnvdPatchRelease NotesVendor AdvisoryWEB
- docs.saltstack.com/en/latest/topics/releases/2017.7.1.htmlnvdPatchRelease NotesVendor AdvisoryWEB
- github.com/saltstack/salt/pull/42944nvdIssue TrackingPatchThird Party AdvisoryWEB
- www.securityfocus.com/bid/100384nvdThird Party AdvisoryVDB Entry
- github.com/advisories/GHSA-xxvj-8g5m-4qgwghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2017-12791ghsaADVISORY
- github.com/pypa/advisory-database/tree/main/vulns/salt/PYSEC-2017-35.yamlghsaWEB
News mentions
0No linked articles in our index yet.