VYPR

rpm package

suse/salt&distro=SUSE Linux Enterprise Module for Basesystem 15 SP2

pkg:rpm/suse/salt&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP2

Vulnerabilities (20)

  • CVE-2021-21996Sep 8, 2021
    affected < 3002.2-49.2fixed 3002.2-49.2

    An issue was discovered in SaltStack Salt before 3003.3. A user who has control of the source, and source_hash URLs can gain full file system access as root on a salt minion.

  • CVE-2021-31607Apr 23, 2021
    affected < 3002.2-37.1fixed 3002.2-37.1

    In SaltStack Salt 2016.9 through 3002.6, a command injection vulnerability exists in the snapper module that allows for local privilege escalation on a minion. The attack requires that a file is created with a pathname that is backed up by snapper, and that the master calls the s

  • CVE-2021-25315Mar 3, 2021
    affected < 3002.2-37.1fixed 3002.2-37.1

    CWE - CWE-287: Improper Authentication vulnerability in SUSE Linux Enterprise Server 15 SP 3; openSUSE Tumbleweed allows local attackers to execute arbitrary code via salt without the need to specify valid credentials. This issue affects: SUSE Linux Enterprise Server 15 SP 3 salt

  • CVE-2021-3197Feb 27, 2021
    affected < 3000-24.1fixed 3000-24.1

    An issue was discovered in SaltStack Salt before 3002.5. The salt-api's ssh client is vulnerable to a shell injection by including ProxyCommand in an argument, or via ssh_options provided in an API request.

  • CVE-2021-3148Feb 27, 2021
    affected < 3000-24.1fixed 3000-24.1

    An issue was discovered in SaltStack Salt before 3002.5. Sending crafted web requests to the Salt API can result in salt.utils.thin.gen_thin() command injection because of different handling of single versus double quotes. This is related to salt/utils/thin.py.

  • CVE-2021-3144Feb 27, 2021
    affected < 3000-24.1fixed 3000-24.1

    In SaltStack Salt before 3002.5, eauth tokens can be used once after expiration. (They might be used to run command against the salt master or minions.)

  • CVE-2021-25284Feb 27, 2021
    affected < 3000-24.1fixed 3000-24.1

    An issue was discovered in through SaltStack Salt before 3002.5. salt.modules.cmdmod can log credentials to the info or error log level.

  • CVE-2021-25283Feb 27, 2021
    affected < 3000-24.1fixed 3000-24.1

    An issue was discovered in through SaltStack Salt before 3002.5. The jinja renderer does not protect against server side template injection attacks.

  • CVE-2021-25282Feb 27, 2021
    affected < 3000-24.1fixed 3000-24.1

    An issue was discovered in through SaltStack Salt before 3002.5. The salt.wheel.pillar_roots.write method is vulnerable to directory traversal.

  • CVE-2021-25281Feb 27, 2021
    affected < 3000-24.1fixed 3000-24.1

    An issue was discovered in through SaltStack Salt before 3002.5. salt-api does not honor eauth credentials for the wheel_async client. Thus, an attacker can remotely run any wheel modules on the master.

  • CVE-2020-35662Feb 27, 2021
    affected < 3000-24.1fixed 3000-24.1

    In SaltStack Salt before 3002.5, when authenticating to services using certain modules, the SSL certificate is not always validated.

  • CVE-2020-28972Feb 27, 2021
    affected < 3000-24.1fixed 3000-24.1

    In SaltStack Salt before 3002.5, authentication to VMware vcenter, vsphere, and esxi servers (in the vmware.py files) does not always validate the SSL/TLS certificate.

  • CVE-2020-28243Feb 27, 2021
    affected < 3000-24.1fixed 3000-24.1

    An issue was discovered in SaltStack Salt before 3002.5. The minion's restartcheck is vulnerable to command injection via a crafted process name. This allows for a local privilege escalation by any user able to create a files on the minion in a non-blacklisted directory.

  • CVE-2020-25592Nov 6, 2020
    affected < 3000-4.20.1fixed 3000-4.20.1

    In SaltStack Salt through 3002, salt-netapi improperly validates eauth credentials and tokens. A user can bypass authentication and invoke Salt SSH.

  • CVE-2020-17490Nov 6, 2020
    affected < 3000-4.20.1fixed 3000-4.20.1

    The TLS module within SaltStack Salt through 3002 creates certificates with weak file permissions.

  • CVE-2020-16846KEVNov 6, 2020
    affected < 3000-4.20.1fixed 3000-4.20.1

    An issue was discovered in SaltStack Salt through 3002. Sending crafted web requests to the Salt API, with the SSH client enabled, can result in shell injection.

  • CVE-2020-11652KEVApr 30, 2020
    affected < 3002.2-37.1fixed 3002.2-37.1

    An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2. The salt-master process ClearFuncs class allows access to some methods that improperly sanitize paths. These methods allow arbitrary directory access to authenticated users.

  • CVE-2020-11651KEVApr 30, 2020
    affected < 3002.2-37.1fixed 3002.2-37.1

    An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2. The salt-master process ClearFuncs class does not properly validate method calls. This allows a remote user to access some methods without authentication. These methods can be used to retrieve user

  • CVE-2018-15751Oct 24, 2018
    affected < 3002.2-37.1fixed 3002.2-37.1

    SaltStack Salt before 2017.7.8 and 2018.3.x before 2018.3.3 allow remote attackers to bypass authentication and execute arbitrary commands via salt-api(netapi).

  • CVE-2018-15750Oct 24, 2018
    affected < 3002.2-37.1fixed 3002.2-37.1

    Directory Traversal vulnerability in salt-api in SaltStack Salt before 2017.7.8 and 2018.3.x before 2018.3.3 allows remote attackers to determine which files exist on the server.