Page 2 of 7 results (0.003 seconds)

CVSS: 8.8EPSS: 0%CPEs: 3EXPL: 0

An issue was discovered in SaltStack Salt in versions before 3002.8, 3003.4, 3004.1. Job publishes and file server replies are susceptible to replay attacks, which can result in an attacker replaying job publishes causing minions to run old jobs. File server replies can also be re-played. A sufficient craft attacker could gain root access on minion under certain scenarios. Se ha detectado un problema en SaltStack Salt en versiones anteriores a 3002.8, 3003.4, 3004.1. • https://github.com/saltstack/salt/releases%2C https://repo.saltproject.io https://saltproject.io/security_announcements/salt-security-advisory-release/%2C https://security.gentoo.org/glsa/202310-22 • CWE-294: Authentication Bypass by Capture-replay •

CVSS: 8.8EPSS: 0%CPEs: 3EXPL: 0

An issue was discovered in SaltStack Salt in versions before 3002.8, 3003.4, 3004.1. When configured as a Master-of-Masters, with a publisher_acl, if a user configured in the publisher_acl targets any minion connected to the Syndic, the Salt Master incorrectly interpreted no valid targets as valid, allowing configured users to target any of the minions connected to the syndic with their configured commands. This requires a syndic master combined with publisher_acl configured on the Master-of-Masters, allowing users specified in the publisher_acl to bypass permissions, publishing authorized commands to any configured minion. Se ha detectado un problema en SaltStack Salt en versiones anteriores a 3002.8, 3003.4, 3004.1. Cuando es configurado como "Master-of-Masters", con un publisher_acl, si un usuario configurado en el publisher_acl apunta a cualquier minion conectado al Syndic, el Maestro de Salt interpreta incorrectamente que no presenta objetivos válidos, permitiendo a usuarios configurados apuntar a cualquiera de los minions conectados al syndic con sus comandos configurados. • https://github.com/saltstack/salt/releases%2C https://repo.saltproject.io https://saltproject.io/security_announcements/salt-security-advisory-release/%2C https://security.gentoo.org/glsa/202310-22 • CWE-732: Incorrect Permission Assignment for Critical Resource •