
CVE-2021-25283 – Gentoo Linux Security Advisory 202310-22
https://notcve.org/view.php?id=CVE-2021-25283
26 Feb 2021 — An issue was discovered in through SaltStack Salt before 3002.5. The jinja renderer does not protect against server side template injection attacks. Se detectó un problema por medio de SaltStack Salt versiones anteriores a 3002.5. El renderizador jinja no protege contra ataques de inyección de plantilla del lado del servidor It was discovered that Salt incorrectly handled crafted web requests. A remote attacker could possibly use this issue to run arbitrary commands. • https://github.com/saltstack/salt/releases • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVE-2021-3144 – Gentoo Linux Security Advisory 202310-22
https://notcve.org/view.php?id=CVE-2021-3144
26 Feb 2021 — In SaltStack Salt before 3002.5, eauth tokens can be used once after expiration. (They might be used to run command against the salt master or minions.) En SaltStack Salt versiones anteriores a 3002.5, los tokens de eauth pueden ser usados una vez después de su vencimiento. (Pueden ser usados para ejecutar un comando contra el maestro de sal o los minions) Multiple security vulnerabilities have been discovered in Salt, a powerful remote execution manager, that allow for local privilege escalation on a ... • https://github.com/saltstack/salt/releases • CWE-613: Insufficient Session Expiration •

CVE-2021-3197 – Gentoo Linux Security Advisory 202310-22
https://notcve.org/view.php?id=CVE-2021-3197
26 Feb 2021 — An issue was discovered in SaltStack Salt before 3002.5. The salt-api's ssh client is vulnerable to a shell injection by including ProxyCommand in an argument, or via ssh_options provided in an API request. Se detectó un problema en SaltStack Salt versiones anteriores a 3002.5. El cliente ssh de salt-api es vulnerable a una inyección de shell al incluir ProxyCommand en un argumento, o por medio de ssh_options proporcionadas en una petición de API It was discovered that Salt incorrectly handled crafted ... • https://github.com/saltstack/salt/releases • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •

CVE-2020-25592 – Ubuntu Security Notice USN-6948-1
https://notcve.org/view.php?id=CVE-2020-25592
06 Nov 2020 — In SaltStack Salt through 3002, salt-netapi improperly validates eauth credentials and tokens. A user can bypass authentication and invoke Salt SSH. En SaltStack Salt versiones hasta 3002, salt-netapi comprueba inapropiadamente credenciales y tokens de eauth. Un usuario puede omitir la autenticación e invocar Salt SSH It was discovered that Salt incorrectly handled crafted web requests. A remote attacker could possibly use this issue to run arbitrary commands. • https://packetstorm.news/files/id/160039 • CWE-287: Improper Authentication •

CVE-2020-17490 – Ubuntu Security Notice USN-6948-1
https://notcve.org/view.php?id=CVE-2020-17490
06 Nov 2020 — The TLS module within SaltStack Salt through 3002 creates certificates with weak file permissions. El módulo TLS dentro de SaltStack Salt versiones hasta 3002, crea certificados con permisos de archivo débiles It was discovered that Salt incorrectly handled crafted web requests. A remote attacker could possibly use this issue to run arbitrary commands. It was discovered that Salt incorrectly created certificates with weak file permissions. It was discovered that Salt incorrectly handled credential validatio... • http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00029.html • CWE-732: Incorrect Permission Assignment for Critical Resource •

CVE-2020-16846 – SaltStack Salt Shell Injection Vulnerability
https://notcve.org/view.php?id=CVE-2020-16846
06 Nov 2020 — An issue was discovered in SaltStack Salt through 3002. Sending crafted web requests to the Salt API, with the SSH client enabled, can result in shell injection. Se detectó un problema en SaltStack Salt versiones hasta 3002. El envío de peticiones web diseñadas a la Salt API, con el cliente SSH habilitado, puede resultar en una inyección shell This vulnerability allows remote attackers to execute arbitrary code on affected installations of SaltStack Salt. Authentication is not required to exploit this vulne... • https://packetstorm.news/files/id/160039 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVE-2020-11652 – SaltStack Salt Path Traversal Vulnerability
https://notcve.org/view.php?id=CVE-2020-11652
30 Apr 2020 — An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2. The salt-master process ClearFuncs class allows access to some methods that improperly sanitize paths. These methods allow arbitrary directory access to authenticated users. Se descubrió un problema en SaltStack Salt versiones anteriores a la versión 2019.2.4 y versiones 3000 anteriores a 3000.2. La clase ClearFuncs del proceso Salt-master permite acceder a algunos métodos que sanean inapropiadamente las rutas. • https://packetstorm.news/files/id/180608 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVE-2020-11651 – SaltStack Salt Authentication Bypass Vulnerability
https://notcve.org/view.php?id=CVE-2020-11651
30 Apr 2020 — An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2. The salt-master process ClearFuncs class does not properly validate method calls. This allows a remote user to access some methods without authentication. These methods can be used to retrieve user tokens from the salt master and/or run arbitrary commands on salt minions. Se ha descubierto un fallo de salto de archivo en todas las versiones de ansible-engine 2.9.x anteriores a la versión 2.9.7, cuando se ejecuta una instalació... • https://packetstorm.news/files/id/180608 •

CVE-2019-17361 – Debian Security Advisory 4676-1
https://notcve.org/view.php?id=CVE-2019-17361
17 Jan 2020 — In SaltStack Salt through 2019.2.0, the salt-api NET API with the ssh client enabled is vulnerable to command injection. This allows an unauthenticated attacker with network access to the API endpoint to execute arbitrary code on the salt-api host. En SaltStack Salt hasta 2019.2.0, la API NET de salt-api con el cliente ssh habilitado es vulnerable a la inyección de comandos. Esto permite que un atacante no autenticado con acceso de red al punto final de la API ejecute código arbitrario en el host salt-api. ... • http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00026.html • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVE-2013-2228
https://notcve.org/view.php?id=CVE-2013-2228
03 Dec 2019 — SaltStack RSA Key Generation allows remote users to decrypt communications SaltStack RSA Key Generation, permite a usuarios remotos descifrar las comunicaciones. • http://www.openwall.com/lists/oss-security/2013/07/01/1 • CWE-307: Improper Restriction of Excessive Authentication Attempts •