Page 4 of 32 results (0.024 seconds)

CVSS: 7.8EPSS: 0%CPEs: 21EXPL: 2

An issue was discovered in SaltStack Salt before 3002.5. The minion's restartcheck is vulnerable to command injection via a crafted process name. This allows for a local privilege escalation by any user able to create a files on the minion in a non-blacklisted directory. Se detectó un problema en SaltStack Salt versiones anteriores a 3002.5. La comprobación de reinicio del minion es vulnerable a una inyección de comandos por medio de un nombre de proceso diseñado. • https://github.com/stealthcopter/CVE-2020-28243 https://lists.debian.org/debian-lts-announce/2021/11/msg00009.html https://lists.debian.org/debian-lts-announce/2022/01/msg00000.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7GRVZ5WAEI3XFN2BDTL6DDXFS5HYSDVB https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FUGLOJ6NXLCIFRD2JTXBYQEMAEF2B6XH https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YOGNT2XW • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVSS: 9.8EPSS: 77%CPEs: 21EXPL: 0

An issue was discovered in SaltStack Salt before 3002.5. The salt-api's ssh client is vulnerable to a shell injection by including ProxyCommand in an argument, or via ssh_options provided in an API request. Se detectó un problema en SaltStack Salt versiones anteriores a 3002.5. El cliente ssh de salt-api es vulnerable a una inyección de shell al incluir ProxyCommand en un argumento, o por medio de ssh_options proporcionadas en una petición de API • https://github.com/saltstack/salt/releases https://lists.debian.org/debian-lts-announce/2021/11/msg00009.html https://lists.debian.org/debian-lts-announce/2022/01/msg00000.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7GRVZ5WAEI3XFN2BDTL6DDXFS5HYSDVB https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FUGLOJ6NXLCIFRD2JTXBYQEMAEF2B6XH https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YOGNT2XWPOYV7YT7 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •

CVSS: 9.8EPSS: 85%CPEs: 21EXPL: 2

An issue was discovered in through SaltStack Salt before 3002.5. salt-api does not honor eauth credentials for the wheel_async client. Thus, an attacker can remotely run any wheel modules on the master. Se detectó un problema por medio de SaltStack Salt versiones anteriores a 3002.5. salt-api no respeta las credenciales de eauth para el cliente wheel_async. Por lo tanto, un atacante puede ejecutar remotamente cualquier módulo wheel en el maestro • https://github.com/Immersive-Labs-Sec/CVE-2021-25281 http://packetstormsecurity.com/files/162058/SaltStack-Salt-API-Unauthenticated-Remote-Command-Execution.html https://github.com/saltstack/salt/releases https://lists.debian.org/debian-lts-announce/2021/11/msg00009.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7GRVZ5WAEI3XFN2BDTL6DDXFS5HYSDVB https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FUGLOJ6NXLCIFRD2JTXBYQEMAEF2B6XH https://list • CWE-287: Improper Authentication •

CVSS: 9.8EPSS: 51%CPEs: 16EXPL: 0

In SaltStack Salt through 3002, salt-netapi improperly validates eauth credentials and tokens. A user can bypass authentication and invoke Salt SSH. En SaltStack Salt versiones hasta 3002, salt-netapi comprueba inapropiadamente credenciales y tokens de eauth. Un usuario puede omitir la autenticación e invocar Salt SSH • http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00029.html http://packetstormsecurity.com/files/160039/SaltStack-Salt-REST-API-Arbitrary-Command-Execution.html https://docs.saltstack.com/en/latest/topics/releases/index.html https://lists.debian.org/debian-lts-announce/2020/12/msg00007.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TPOGB2F6XUAIGFDTOCQDNB2VIXFXHWMA https://security.gentoo.org/glsa/202011-13 https://www.debian.org/security/2021/dsa& • CWE-287: Improper Authentication •

CVSS: 5.5EPSS: 0%CPEs: 16EXPL: 0

The TLS module within SaltStack Salt through 3002 creates certificates with weak file permissions. El módulo TLS dentro de SaltStack Salt versiones hasta 3002, crea certificados con permisos de archivo débiles • http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00029.html https://docs.saltstack.com/en/latest/topics/releases/index.html#latest-branch-release https://lists.debian.org/debian-lts-announce/2020/12/msg00007.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TPOGB2F6XUAIGFDTOCQDNB2VIXFXHWMA https://security.gentoo.org/glsa/202011-13 https://www.debian.org/security/2021/dsa-4837 https://www.saltstack.com/blog/on-november-3-2020-saltstack-publicl • CWE-732: Incorrect Permission Assignment for Critical Resource •