rpm package
suse/salt&distro=SUSE Manager Proxy 3.2
pkg:rpm/suse/salt&distro=SUSE%20Manager%20Proxy%203.2
Vulnerabilities (9)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2020-25592 | — | < 3000-46.114.1 | 3000-46.114.1 | Nov 6, 2020 | In SaltStack Salt through 3002, salt-netapi improperly validates eauth credentials and tokens. A user can bypass authentication and invoke Salt SSH. | ||
| CVE-2020-17490 | — | < 3000-46.114.1 | 3000-46.114.1 | Nov 6, 2020 | The TLS module within SaltStack Salt through 3002 creates certificates with weak file permissions. | ||
| CVE-2020-16846 | — | KEV | < 3000-46.114.1 | 3000-46.114.1 | Nov 6, 2020 | An issue was discovered in SaltStack Salt through 3002. Sending crafted web requests to the Salt API, with the SSH client enabled, can result in shell injection. | |
| CVE-2020-11652 | — | KEV | < 2019.2.0-46.91.1 | 2019.2.0-46.91.1 | Apr 30, 2020 | An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2. The salt-master process ClearFuncs class allows access to some methods that improperly sanitize paths. These methods allow arbitrary directory access to authenticated users. | |
| CVE-2020-11651 | — | KEV | < 2019.2.0-46.91.1 | 2019.2.0-46.91.1 | Apr 30, 2020 | An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2. The salt-master process ClearFuncs class does not properly validate method calls. This allows a remote user to access some methods without authentication. These methods can be used to retrieve user | |
| CVE-2019-18897 | — | < 2019.2.0-46.88.1 | 2019.2.0-46.88.1 | Mar 2, 2020 | A UNIX Symbolic Link (Symlink) Following vulnerability in the packaging of salt of SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 15; openSUSE Factory allows local attackers to escalate privileges from user salt to root. This issue affects: SUSE Linux Enterprise Se | ||
| CVE-2019-17361 | — | < 2019.2.0-46.88.1 | 2019.2.0-46.88.1 | Jan 17, 2020 | In SaltStack Salt through 2019.2.0, the salt-api NET API with the ssh client enabled is vulnerable to command injection. This allows an unauthenticated attacker with network access to the API endpoint to execute arbitrary code on the salt-api host. | ||
| CVE-2018-15751 | — | < 2018.3.0-46.44.1 | 2018.3.0-46.44.1 | Oct 24, 2018 | SaltStack Salt before 2017.7.8 and 2018.3.x before 2018.3.3 allow remote attackers to bypass authentication and execute arbitrary commands via salt-api(netapi). | ||
| CVE-2018-15750 | — | < 2018.3.0-46.44.1 | 2018.3.0-46.44.1 | Oct 24, 2018 | Directory Traversal vulnerability in salt-api in SaltStack Salt before 2017.7.8 and 2018.3.x before 2018.3.3 allows remote attackers to determine which files exist on the server. |
- CVE-2020-25592Nov 6, 2020affected < 3000-46.114.1fixed 3000-46.114.1
In SaltStack Salt through 3002, salt-netapi improperly validates eauth credentials and tokens. A user can bypass authentication and invoke Salt SSH.
- CVE-2020-17490Nov 6, 2020affected < 3000-46.114.1fixed 3000-46.114.1
The TLS module within SaltStack Salt through 3002 creates certificates with weak file permissions.
- affected < 3000-46.114.1fixed 3000-46.114.1
An issue was discovered in SaltStack Salt through 3002. Sending crafted web requests to the Salt API, with the SSH client enabled, can result in shell injection.
- affected < 2019.2.0-46.91.1fixed 2019.2.0-46.91.1
An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2. The salt-master process ClearFuncs class allows access to some methods that improperly sanitize paths. These methods allow arbitrary directory access to authenticated users.
- affected < 2019.2.0-46.91.1fixed 2019.2.0-46.91.1
An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2. The salt-master process ClearFuncs class does not properly validate method calls. This allows a remote user to access some methods without authentication. These methods can be used to retrieve user
- CVE-2019-18897Mar 2, 2020affected < 2019.2.0-46.88.1fixed 2019.2.0-46.88.1
A UNIX Symbolic Link (Symlink) Following vulnerability in the packaging of salt of SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 15; openSUSE Factory allows local attackers to escalate privileges from user salt to root. This issue affects: SUSE Linux Enterprise Se
- CVE-2019-17361Jan 17, 2020affected < 2019.2.0-46.88.1fixed 2019.2.0-46.88.1
In SaltStack Salt through 2019.2.0, the salt-api NET API with the ssh client enabled is vulnerable to command injection. This allows an unauthenticated attacker with network access to the API endpoint to execute arbitrary code on the salt-api host.
- CVE-2018-15751Oct 24, 2018affected < 2018.3.0-46.44.1fixed 2018.3.0-46.44.1
SaltStack Salt before 2017.7.8 and 2018.3.x before 2018.3.3 allow remote attackers to bypass authentication and execute arbitrary commands via salt-api(netapi).
- CVE-2018-15750Oct 24, 2018affected < 2018.3.0-46.44.1fixed 2018.3.0-46.44.1
Directory Traversal vulnerability in salt-api in SaltStack Salt before 2017.7.8 and 2018.3.x before 2018.3.3 allows remote attackers to determine which files exist on the server.