rpm package
suse/salt&distro=SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS
pkg:rpm/suse/salt&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-CLIENT-TOOLS
Vulnerabilities (23)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2021-21996 | — | < 2016.11.10-43.84.1 | 2016.11.10-43.84.1 | Sep 8, 2021 | An issue was discovered in SaltStack Salt before 3003.3. A user who has control of the source, and source_hash URLs can gain full file system access as root on a salt minion. | ||
| CVE-2021-31607 | — | < 2016.11.10-43.75.1 | 2016.11.10-43.75.1 | Apr 23, 2021 | In SaltStack Salt 2016.9 through 3002.6, a command injection vulnerability exists in the snapper module that allows for local privilege escalation on a minion. The attack requires that a file is created with a pathname that is backed up by snapper, and that the master calls the s | ||
| CVE-2021-3197 | — | < 2016.11.10-43.69.1 | 2016.11.10-43.69.1 | Feb 27, 2021 | An issue was discovered in SaltStack Salt before 3002.5. The salt-api's ssh client is vulnerable to a shell injection by including ProxyCommand in an argument, or via ssh_options provided in an API request. | ||
| CVE-2021-3148 | — | < 2016.11.10-43.69.1 | 2016.11.10-43.69.1 | Feb 27, 2021 | An issue was discovered in SaltStack Salt before 3002.5. Sending crafted web requests to the Salt API can result in salt.utils.thin.gen_thin() command injection because of different handling of single versus double quotes. This is related to salt/utils/thin.py. | ||
| CVE-2021-3144 | — | < 2016.11.10-43.69.1 | 2016.11.10-43.69.1 | Feb 27, 2021 | In SaltStack Salt before 3002.5, eauth tokens can be used once after expiration. (They might be used to run command against the salt master or minions.) | ||
| CVE-2021-25284 | — | < 2016.11.10-43.69.1 | 2016.11.10-43.69.1 | Feb 27, 2021 | An issue was discovered in through SaltStack Salt before 3002.5. salt.modules.cmdmod can log credentials to the info or error log level. | ||
| CVE-2021-25283 | — | < 2016.11.10-43.69.1 | 2016.11.10-43.69.1 | Feb 27, 2021 | An issue was discovered in through SaltStack Salt before 3002.5. The jinja renderer does not protect against server side template injection attacks. | ||
| CVE-2021-25282 | — | < 2016.11.10-43.69.1 | 2016.11.10-43.69.1 | Feb 27, 2021 | An issue was discovered in through SaltStack Salt before 3002.5. The salt.wheel.pillar_roots.write method is vulnerable to directory traversal. | ||
| CVE-2021-25281 | — | < 2016.11.10-43.69.1 | 2016.11.10-43.69.1 | Feb 27, 2021 | An issue was discovered in through SaltStack Salt before 3002.5. salt-api does not honor eauth credentials for the wheel_async client. Thus, an attacker can remotely run any wheel modules on the master. | ||
| CVE-2020-35662 | — | < 2016.11.10-43.69.1 | 2016.11.10-43.69.1 | Feb 27, 2021 | In SaltStack Salt before 3002.5, when authenticating to services using certain modules, the SSL certificate is not always validated. | ||
| CVE-2020-28972 | — | < 2016.11.10-43.69.1 | 2016.11.10-43.69.1 | Feb 27, 2021 | In SaltStack Salt before 3002.5, authentication to VMware vcenter, vsphere, and esxi servers (in the vmware.py files) does not always validate the SSL/TLS certificate. | ||
| CVE-2020-28243 | — | < 2016.11.10-43.69.1 | 2016.11.10-43.69.1 | Feb 27, 2021 | An issue was discovered in SaltStack Salt before 3002.5. The minion's restartcheck is vulnerable to command injection via a crafted process name. This allows for a local privilege escalation by any user able to create a files on the minion in a non-blacklisted directory. | ||
| CVE-2020-25592 | — | < 2016.11.10-43.63.1 | 2016.11.10-43.63.1 | Nov 6, 2020 | In SaltStack Salt through 3002, salt-netapi improperly validates eauth credentials and tokens. A user can bypass authentication and invoke Salt SSH. | ||
| CVE-2020-17490 | — | < 2016.11.10-43.63.1 | 2016.11.10-43.63.1 | Nov 6, 2020 | The TLS module within SaltStack Salt through 3002 creates certificates with weak file permissions. | ||
| CVE-2020-16846 | — | KEV | < 2016.11.10-43.63.1 | 2016.11.10-43.63.1 | Nov 6, 2020 | An issue was discovered in SaltStack Salt through 3002. Sending crafted web requests to the Salt API, with the SSH client enabled, can result in shell injection. | |
| CVE-2018-15751 | — | < 2016.11.10-43.38.1 | 2016.11.10-43.38.1 | Oct 24, 2018 | SaltStack Salt before 2017.7.8 and 2018.3.x before 2018.3.3 allow remote attackers to bypass authentication and execute arbitrary commands via salt-api(netapi). | ||
| CVE-2018-15750 | — | < 2016.11.10-43.38.1 | 2016.11.10-43.38.1 | Oct 24, 2018 | Directory Traversal vulnerability in salt-api in SaltStack Salt before 2017.7.8 and 2018.3.x before 2018.3.3 allows remote attackers to determine which files exist on the server. | ||
| CVE-2017-14696 | Hig | 7.5 | < 2016.11.4-43.10.2 | 2016.11.4-43.10.2 | Oct 24, 2017 | SaltStack Salt before 2016.3.8, 2016.11.x before 2016.11.8, and 2017.7.x before 2017.7.2 allows remote attackers to cause a denial of service via a crafted authentication request. | |
| CVE-2017-14695 | Cri | 9.8 | < 2016.11.4-43.10.2 | 2016.11.4-43.10.2 | Oct 24, 2017 | Directory traversal vulnerability in minion id validation in SaltStack Salt before 2016.3.8, 2016.11.x before 2016.11.8, and 2017.7.x before 2017.7.2 allows remote minions with incorrect credentials to authenticate to a master via a crafted minion ID. NOTE: this vulnerability ex | |
| CVE-2017-5200 | Hig | 8.8 | < 2016.11.4-42.2 | 2016.11.4-42.2 | Sep 26, 2017 | Salt-api in SaltStack Salt before 2015.8.13, 2016.3.x before 2016.3.5, and 2016.11.x before 2016.11.2 allows arbitrary command execution on a salt-master via Salt's ssh_client. |
- CVE-2021-21996Sep 8, 2021affected < 2016.11.10-43.84.1fixed 2016.11.10-43.84.1
An issue was discovered in SaltStack Salt before 3003.3. A user who has control of the source, and source_hash URLs can gain full file system access as root on a salt minion.
- CVE-2021-31607Apr 23, 2021affected < 2016.11.10-43.75.1fixed 2016.11.10-43.75.1
In SaltStack Salt 2016.9 through 3002.6, a command injection vulnerability exists in the snapper module that allows for local privilege escalation on a minion. The attack requires that a file is created with a pathname that is backed up by snapper, and that the master calls the s
- CVE-2021-3197Feb 27, 2021affected < 2016.11.10-43.69.1fixed 2016.11.10-43.69.1
An issue was discovered in SaltStack Salt before 3002.5. The salt-api's ssh client is vulnerable to a shell injection by including ProxyCommand in an argument, or via ssh_options provided in an API request.
- CVE-2021-3148Feb 27, 2021affected < 2016.11.10-43.69.1fixed 2016.11.10-43.69.1
An issue was discovered in SaltStack Salt before 3002.5. Sending crafted web requests to the Salt API can result in salt.utils.thin.gen_thin() command injection because of different handling of single versus double quotes. This is related to salt/utils/thin.py.
- CVE-2021-3144Feb 27, 2021affected < 2016.11.10-43.69.1fixed 2016.11.10-43.69.1
In SaltStack Salt before 3002.5, eauth tokens can be used once after expiration. (They might be used to run command against the salt master or minions.)
- CVE-2021-25284Feb 27, 2021affected < 2016.11.10-43.69.1fixed 2016.11.10-43.69.1
An issue was discovered in through SaltStack Salt before 3002.5. salt.modules.cmdmod can log credentials to the info or error log level.
- CVE-2021-25283Feb 27, 2021affected < 2016.11.10-43.69.1fixed 2016.11.10-43.69.1
An issue was discovered in through SaltStack Salt before 3002.5. The jinja renderer does not protect against server side template injection attacks.
- CVE-2021-25282Feb 27, 2021affected < 2016.11.10-43.69.1fixed 2016.11.10-43.69.1
An issue was discovered in through SaltStack Salt before 3002.5. The salt.wheel.pillar_roots.write method is vulnerable to directory traversal.
- CVE-2021-25281Feb 27, 2021affected < 2016.11.10-43.69.1fixed 2016.11.10-43.69.1
An issue was discovered in through SaltStack Salt before 3002.5. salt-api does not honor eauth credentials for the wheel_async client. Thus, an attacker can remotely run any wheel modules on the master.
- CVE-2020-35662Feb 27, 2021affected < 2016.11.10-43.69.1fixed 2016.11.10-43.69.1
In SaltStack Salt before 3002.5, when authenticating to services using certain modules, the SSL certificate is not always validated.
- CVE-2020-28972Feb 27, 2021affected < 2016.11.10-43.69.1fixed 2016.11.10-43.69.1
In SaltStack Salt before 3002.5, authentication to VMware vcenter, vsphere, and esxi servers (in the vmware.py files) does not always validate the SSL/TLS certificate.
- CVE-2020-28243Feb 27, 2021affected < 2016.11.10-43.69.1fixed 2016.11.10-43.69.1
An issue was discovered in SaltStack Salt before 3002.5. The minion's restartcheck is vulnerable to command injection via a crafted process name. This allows for a local privilege escalation by any user able to create a files on the minion in a non-blacklisted directory.
- CVE-2020-25592Nov 6, 2020affected < 2016.11.10-43.63.1fixed 2016.11.10-43.63.1
In SaltStack Salt through 3002, salt-netapi improperly validates eauth credentials and tokens. A user can bypass authentication and invoke Salt SSH.
- CVE-2020-17490Nov 6, 2020affected < 2016.11.10-43.63.1fixed 2016.11.10-43.63.1
The TLS module within SaltStack Salt through 3002 creates certificates with weak file permissions.
- affected < 2016.11.10-43.63.1fixed 2016.11.10-43.63.1
An issue was discovered in SaltStack Salt through 3002. Sending crafted web requests to the Salt API, with the SSH client enabled, can result in shell injection.
- CVE-2018-15751Oct 24, 2018affected < 2016.11.10-43.38.1fixed 2016.11.10-43.38.1
SaltStack Salt before 2017.7.8 and 2018.3.x before 2018.3.3 allow remote attackers to bypass authentication and execute arbitrary commands via salt-api(netapi).
- CVE-2018-15750Oct 24, 2018affected < 2016.11.10-43.38.1fixed 2016.11.10-43.38.1
Directory Traversal vulnerability in salt-api in SaltStack Salt before 2017.7.8 and 2018.3.x before 2018.3.3 allows remote attackers to determine which files exist on the server.
- affected < 2016.11.4-43.10.2fixed 2016.11.4-43.10.2
SaltStack Salt before 2016.3.8, 2016.11.x before 2016.11.8, and 2017.7.x before 2017.7.2 allows remote attackers to cause a denial of service via a crafted authentication request.
- affected < 2016.11.4-43.10.2fixed 2016.11.4-43.10.2
Directory traversal vulnerability in minion id validation in SaltStack Salt before 2016.3.8, 2016.11.x before 2016.11.8, and 2017.7.x before 2017.7.2 allows remote minions with incorrect credentials to authenticate to a master via a crafted minion ID. NOTE: this vulnerability ex
- affected < 2016.11.4-42.2fixed 2016.11.4-42.2
Salt-api in SaltStack Salt before 2015.8.13, 2016.3.x before 2016.3.5, and 2016.11.x before 2016.11.2 allows arbitrary command execution on a salt-master via Salt's ssh_client.
Page 1 of 2