Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Salt
(Saltstack)Repositories | https://github.com/saltstack/salt |
#Vulnerabilities | 51 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2023-09-05 | CVE-2023-20897 | Salt masters prior to 3005.2 or 3006.2 contain a DOS in minion return. After receiving several bad packets on the request server equal to the number of worker threads, the master will become unresponsive to return requests until restarted. | Salt | 5.3 | ||
2023-09-05 | CVE-2023-20898 | Git Providers can read from the wrong environment because they get the same cache directory base name in Salt masters prior to 3005.2 or 3006.2. Anything that uses Git Providers with different environments can get garbage data or the wrong data, which can lead to wrongful data disclosure, wrongful executions, data corruption and/or crash. | Salt | 7.8 | ||
2020-04-30 | CVE-2020-11651 | An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2. The salt-master process ClearFuncs class does not properly validate method calls. This allows a remote user to access some methods without authentication. These methods can be used to retrieve user tokens from the salt master and/or run arbitrary commands on salt minions. | Ubuntu_linux, Debian_linux, Leap, Salt, Application_remote_collector | 9.8 | ||
2020-04-30 | CVE-2020-11652 | An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2. The salt-master process ClearFuncs class allows access to some methods that improperly sanitize paths. These methods allow arbitrary directory access to authenticated users. | Workspaces_server, Ubuntu_linux, Debian_linux, Leap, Salt, Application_remote_collector | 6.5 | ||
2020-11-06 | CVE-2020-17490 | The TLS module within SaltStack Salt through 3002 creates certificates with weak file permissions. | Debian_linux, Salt | 5.5 | ||
2020-11-06 | CVE-2020-25592 | In SaltStack Salt through 3002, salt-netapi improperly validates eauth credentials and tokens. A user can bypass authentication and invoke Salt SSH. | Debian_linux, Salt | 9.8 | ||
2021-02-27 | CVE-2020-28243 | An issue was discovered in SaltStack Salt before 3002.5. The minion's restartcheck is vulnerable to command injection via a crafted process name. This allows for a local privilege escalation by any user able to create a files on the minion in a non-blacklisted directory. | Debian_linux, Fedora, Salt | 7.8 | ||
2021-02-27 | CVE-2020-28972 | In SaltStack Salt before 3002.5, authentication to VMware vcenter, vsphere, and esxi servers (in the vmware.py files) does not always validate the SSL/TLS certificate. | Debian_linux, Fedora, Salt | 5.9 | ||
2021-02-27 | CVE-2020-35662 | In SaltStack Salt before 3002.5, when authenticating to services using certain modules, the SSL certificate is not always validated. | Debian_linux, Fedora, Salt | 7.4 | ||
2021-02-27 | CVE-2021-25281 | An issue was discovered in through SaltStack Salt before 3002.5. salt-api does not honor eauth credentials for the wheel_async client. Thus, an attacker can remotely run any wheel modules on the master. | Debian_linux, Fedora, Salt | 9.8 |