Vendor
Saltstack
Products
1
CVEs
18
Across products
121
Status
Private
Products
1- 121 CVEs
Recent CVEs
18| CVE | Sev | Risk | CVSS | EPSS | KEV | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2016-9639 | Cri | 0.59 | 9.1 | 0.01 | Feb 7, 2017 | Salt before 2015.8.11 allows deleted minions to read or write to minions with the same id, related to caching. | |
| CVE-2017-14695 | Cri | 0.57 | 9.8 | 0.00 | Oct 24, 2017 | Directory traversal vulnerability in minion id validation in SaltStack Salt before 2016.3.8, 2016.11.x before 2016.11.8, and 2017.7.x before 2017.7.2 allows remote minions with incorrect credentials to authenticate to a master via a crafted minion ID. NOTE: this vulnerability exists because of an incomplete fix for CVE-2017-12791. | |
| CVE-2017-5200 | Hig | 0.57 | 8.8 | 0.01 | Sep 26, 2017 | Salt-api in SaltStack Salt before 2015.8.13, 2016.3.x before 2016.3.5, and 2016.11.x before 2016.11.2 allows arbitrary command execution on a salt-master via Salt's ssh_client. | |
| CVE-2017-5192 | Hig | 0.57 | 8.8 | 0.00 | Sep 26, 2017 | When using the local_batch client from salt-api in SaltStack Salt before 2015.8.13, 2016.3.x before 2016.3.5, and 2016.11.x before 2016.11.2, external authentication is not respected, enabling all authentication to be bypassed. | |
| CVE-2015-4017 | Hig | 0.49 | 7.5 | 0.00 | Aug 25, 2017 | Salt before 2014.7.6 does not verify certificates when connecting via the aliyun, proxmox, and splunk modules. | |
| CVE-2017-14696 | Hig | 0.42 | 7.5 | 0.02 | Oct 24, 2017 | SaltStack Salt before 2016.3.8, 2016.11.x before 2016.11.8, and 2017.7.x before 2017.7.2 allows remote attackers to cause a denial of service via a crafted authentication request. | |
| CVE-2016-3176 | Med | 0.36 | 5.6 | 0.00 | Jan 31, 2017 | Salt before 2015.5.10 and 2015.8.x before 2015.8.8, when PAM external authentication is enabled, allows attackers to bypass the configured authentication service by passing an alternate service with a command sent to LocalClient. | |
| CVE-2015-1839 | Med | 0.27 | 5.3 | 0.00 | Apr 13, 2017 | modules/chef.py in SaltStack before 2014.7.4 does not properly handle files in /tmp. | |
| CVE-2015-1838 | Med | 0.27 | 5.3 | 0.00 | Apr 13, 2017 | modules/serverdensity_device.py in SaltStack before 2014.7.4 does not properly handle files in /tmp. | |
| CVE-2015-8034 | Low | 0.21 | 3.3 | 0.00 | Jan 30, 2017 | The state.sls function in Salt before 2015.8.3 uses weak permissions on the cache data, which allows local users to obtain sensitive information by reading the file. | |
| CVE-2019-1010259 | 0.00 | — | 0.00 | Jul 18, 2019 | SaltStack Salt 2018.3, 2019.2 is affected by: SQL Injection. The impact is: An attacker could escalate privileges on MySQL server deployed by cloud provider. It leads to RCE. The component is: The mysql.user_chpass function from the MySQL module for Salt. The attack vector is: specially crafted password string. The fixed version is: 2018.3.4. | ||
| CVE-2014-3563 | 0.00 | — | 0.00 | Aug 22, 2014 | Multiple unspecified vulnerabilities in Salt (aka SaltStack) before 2014.1.10 allow local users to have an unspecified impact via vectors related to temporary file creation in (1) seed.py, (2) salt-ssh, or (3) salt-cloud. | ||
| CVE-2013-6617 | 0.00 | — | 0.02 | Nov 5, 2013 | The salt master in Salt (aka SaltStack) 0.11.0 through 0.17.0 does not properly drop group privileges, which makes it easier for remote attackers to gain privileges. | ||
| CVE-2013-4439 | 0.00 | — | 0.00 | Nov 5, 2013 | Salt (aka SaltStack) before 0.15.0 through 0.17.0 allows remote authenticated minions to impersonate arbitrary minions via a crafted minion with a valid key. | ||
| CVE-2013-4438 | 0.00 | — | 0.01 | Nov 5, 2013 | Salt (aka SaltStack) before 0.17.1 allows remote attackers to execute arbitrary YAML code via unspecified vectors. NOTE: the vendor states that this might not be a vulnerability because the YAML to be loaded has already been determined to be safe. | ||
| CVE-2013-4437 | 0.00 | — | 0.01 | Nov 5, 2013 | Unspecified vulnerability in salt-ssh in Salt (aka SaltStack) 0.17.0 has unspecified impact and vectors related to "insecure Usage of /tmp." | ||
| CVE-2013-4436 | 0.00 | — | 0.01 | Nov 5, 2013 | The default configuration for salt-ssh in Salt (aka SaltStack) 0.17.0 does not validate the SSH host key of requests, which allows remote attackers to have unspecified impact via a man-in-the-middle (MITM) attack. | ||
| CVE-2013-4435 | 0.00 | — | 0.00 | Nov 5, 2013 | Salt (aka SaltStack) 0.15.0 through 0.17.0 allows remote authenticated users who are using external authentication or client ACL to execute restricted routines by embedding the routine in another routine. |