![](/assets/img/cve_300x82_sin_bg.png)
CVE-2021-3144 – Gentoo Linux Security Advisory 202310-22
https://notcve.org/view.php?id=CVE-2021-3144
27 Feb 2021 — In SaltStack Salt before 3002.5, eauth tokens can be used once after expiration. (They might be used to run command against the salt master or minions.) En SaltStack Salt versiones anteriores a 3002.5, los tokens de eauth pueden ser usados una vez después de su vencimiento. (Pueden ser usados para ejecutar un comando contra el maestro de sal o los minions) Multiple security vulnerabilities have been discovered in Salt, a powerful remote execution manager, that allow for local privilege escalation on a ... • https://github.com/saltstack/salt/releases • CWE-613: Insufficient Session Expiration •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2021-25284 – Gentoo Linux Security Advisory 202310-22
https://notcve.org/view.php?id=CVE-2021-25284
27 Feb 2021 — An issue was discovered in through SaltStack Salt before 3002.5. salt.modules.cmdmod can log credentials to the info or error log level. Se detectó un problema por medio de SaltStack Salt versiones anteriores a 3002.5. salt.modules.cmdmod puede registrar credenciales para el nivel de registro de información o error It was discovered that Salt incorrectly handled crafted web requests. A remote attacker could possibly use this issue to run arbitrary commands. It was discovered that Salt incorrectly creat... • https://github.com/saltstack/salt/releases • CWE-522: Insufficiently Protected Credentials CWE-532: Insertion of Sensitive Information into Log File •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2020-25592 – Ubuntu Security Notice USN-6948-1
https://notcve.org/view.php?id=CVE-2020-25592
06 Nov 2020 — In SaltStack Salt through 3002, salt-netapi improperly validates eauth credentials and tokens. A user can bypass authentication and invoke Salt SSH. En SaltStack Salt versiones hasta 3002, salt-netapi comprueba inapropiadamente credenciales y tokens de eauth. Un usuario puede omitir la autenticación e invocar Salt SSH It was discovered that Salt incorrectly handled crafted web requests. A remote attacker could possibly use this issue to run arbitrary commands. • https://packetstorm.news/files/id/160039 • CWE-287: Improper Authentication •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2020-17490 – Ubuntu Security Notice USN-6948-1
https://notcve.org/view.php?id=CVE-2020-17490
06 Nov 2020 — The TLS module within SaltStack Salt through 3002 creates certificates with weak file permissions. El módulo TLS dentro de SaltStack Salt versiones hasta 3002, crea certificados con permisos de archivo débiles It was discovered that Salt incorrectly handled crafted web requests. A remote attacker could possibly use this issue to run arbitrary commands. It was discovered that Salt incorrectly created certificates with weak file permissions. It was discovered that Salt incorrectly handled credential validatio... • http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00029.html • CWE-732: Incorrect Permission Assignment for Critical Resource •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2020-16846 – SaltStack Salt Shell Injection Vulnerability
https://notcve.org/view.php?id=CVE-2020-16846
06 Nov 2020 — An issue was discovered in SaltStack Salt through 3002. Sending crafted web requests to the Salt API, with the SSH client enabled, can result in shell injection. Se detectó un problema en SaltStack Salt versiones hasta 3002. El envío de peticiones web diseñadas a la Salt API, con el cliente SSH habilitado, puede resultar en una inyección shell This vulnerability allows remote attackers to execute arbitrary code on affected installations of SaltStack Salt. Authentication is not required to exploit this vulne... • https://packetstorm.news/files/id/160039 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2020-11652 – SaltStack Salt Path Traversal Vulnerability
https://notcve.org/view.php?id=CVE-2020-11652
30 Apr 2020 — An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2. The salt-master process ClearFuncs class allows access to some methods that improperly sanitize paths. These methods allow arbitrary directory access to authenticated users. Se descubrió un problema en SaltStack Salt versiones anteriores a la versión 2019.2.4 y versiones 3000 anteriores a 3000.2. La clase ClearFuncs del proceso Salt-master permite acceder a algunos métodos que sanean inapropiadamente las rutas. • https://packetstorm.news/files/id/180608 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2020-11651 – SaltStack Salt Authentication Bypass Vulnerability
https://notcve.org/view.php?id=CVE-2020-11651
30 Apr 2020 — An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2. The salt-master process ClearFuncs class does not properly validate method calls. This allows a remote user to access some methods without authentication. These methods can be used to retrieve user tokens from the salt master and/or run arbitrary commands on salt minions. Se ha descubierto un fallo de salto de archivo en todas las versiones de ansible-engine 2.9.x anteriores a la versión 2.9.7, cuando se ejecuta una instalació... • https://packetstorm.news/files/id/180608 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2019-17361 – Debian Security Advisory 4676-1
https://notcve.org/view.php?id=CVE-2019-17361
17 Jan 2020 — In SaltStack Salt through 2019.2.0, the salt-api NET API with the ssh client enabled is vulnerable to command injection. This allows an unauthenticated attacker with network access to the API endpoint to execute arbitrary code on the salt-api host. En SaltStack Salt hasta 2019.2.0, la API NET de salt-api con el cliente ssh habilitado es vulnerable a la inyección de comandos. Esto permite que un atacante no autenticado con acceso de red al punto final de la API ejecute código arbitrario en el host salt-api. ... • http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00026.html • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2018-15750 – Ubuntu Security Notice USN-4459-1
https://notcve.org/view.php?id=CVE-2018-15750
24 Oct 2018 — Directory Traversal vulnerability in salt-api in SaltStack Salt before 2017.7.8 and 2018.3.x before 2018.3.3 allows remote attackers to determine which files exist on the server. Vulnerabilidad de salto de directorio en salt-api en SaltStack Salt en versiones anteriores a la 2017.7.8 y versiones 2018.3.x anteriores a la 2018.3.3 permite que atacantes remotos determinen qué archivos existen en el servidor. It was discovered that Salt allows remote attackers to determine which files exist on the server. An at... • http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00070.html • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2018-15751 – Ubuntu Security Notice USN-4459-1
https://notcve.org/view.php?id=CVE-2018-15751
24 Oct 2018 — SaltStack Salt before 2017.7.8 and 2018.3.x before 2018.3.3 allow remote attackers to bypass authentication and execute arbitrary commands via salt-api(netapi). SaltStack Salt en versiones anteriores a la 2017.7.8 y 2018.3.x en versiones anteriores a la 2018.3.3 permite que los atacantes remotos omitan la autenticación y ejecuten comandos arbitrarios mediante salt-api(netapi). It was discovered that Salt allows remote attackers to determine which files exist on the server. An attacker could use that to extr... • http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00070.html • CWE-287: Improper Authentication •