Page 4 of 29 results (0.010 seconds)

CVSS: 9.8EPSS: 5%CPEs: 21EXPL: 0

An issue was discovered in SaltStack Salt before 3002.5. Sending crafted web requests to the Salt API can result in salt.utils.thin.gen_thin() command injection because of different handling of single versus double quotes. This is related to salt/utils/thin.py. Se detectó un problema en SaltStack Salt versiones anteriores a 3002.5. El envío de peticiones web diseñadas a la API de Salt puede resultar en una inyección del comando de la función salt.utils.thin.gen_thin() debido al manejo diferente de las comillas simples y las dobles. • https://github.com/saltstack/salt/releases https://lists.debian.org/debian-lts-announce/2021/11/msg00009.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7GRVZ5WAEI3XFN2BDTL6DDXFS5HYSDVB https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FUGLOJ6NXLCIFRD2JTXBYQEMAEF2B6XH https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YOGNT2XWPOYV7YT75DN7PS4GIYWFKOK5 https://saltproject.io/security_announcements/active-saltstack-c • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVSS: 9.1EPSS: 85%CPEs: 21EXPL: 1

An issue was discovered in through SaltStack Salt before 3002.5. The salt.wheel.pillar_roots.write method is vulnerable to directory traversal. Se detectó un problema por medio de SaltStack Salt versiones anteriores a 3002.5. El método salt.wheel.pillar_roots.write es vulnerable a un salto de directorios • http://packetstormsecurity.com/files/162058/SaltStack-Salt-API-Unauthenticated-Remote-Command-Execution.html https://github.com/saltstack/salt/releases https://lists.debian.org/debian-lts-announce/2021/11/msg00009.html https://lists.debian.org/debian-lts-announce/2022/01/msg00000.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7GRVZ5WAEI3XFN2BDTL6DDXFS5HYSDVB https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FUGLOJ6NXLCIFRD2JTXBYQEMAEF2B6XH ht • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.8EPSS: 0%CPEs: 21EXPL: 2

An issue was discovered in SaltStack Salt before 3002.5. The minion's restartcheck is vulnerable to command injection via a crafted process name. This allows for a local privilege escalation by any user able to create a files on the minion in a non-blacklisted directory. Se detectó un problema en SaltStack Salt versiones anteriores a 3002.5. La comprobación de reinicio del minion es vulnerable a una inyección de comandos por medio de un nombre de proceso diseñado. • https://github.com/stealthcopter/CVE-2020-28243 https://lists.debian.org/debian-lts-announce/2021/11/msg00009.html https://lists.debian.org/debian-lts-announce/2022/01/msg00000.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7GRVZ5WAEI3XFN2BDTL6DDXFS5HYSDVB https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FUGLOJ6NXLCIFRD2JTXBYQEMAEF2B6XH https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YOGNT2XW • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVSS: 9.8EPSS: 51%CPEs: 16EXPL: 0

In SaltStack Salt through 3002, salt-netapi improperly validates eauth credentials and tokens. A user can bypass authentication and invoke Salt SSH. En SaltStack Salt versiones hasta 3002, salt-netapi comprueba inapropiadamente credenciales y tokens de eauth. Un usuario puede omitir la autenticación e invocar Salt SSH • http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00029.html http://packetstormsecurity.com/files/160039/SaltStack-Salt-REST-API-Arbitrary-Command-Execution.html https://docs.saltstack.com/en/latest/topics/releases/index.html https://lists.debian.org/debian-lts-announce/2020/12/msg00007.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TPOGB2F6XUAIGFDTOCQDNB2VIXFXHWMA https://security.gentoo.org/glsa/202011-13 https://www.debian.org/security/2021/dsa& • CWE-287: Improper Authentication •

CVSS: 5.5EPSS: 0%CPEs: 16EXPL: 0

The TLS module within SaltStack Salt through 3002 creates certificates with weak file permissions. El módulo TLS dentro de SaltStack Salt versiones hasta 3002, crea certificados con permisos de archivo débiles • http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00029.html https://docs.saltstack.com/en/latest/topics/releases/index.html#latest-branch-release https://lists.debian.org/debian-lts-announce/2020/12/msg00007.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TPOGB2F6XUAIGFDTOCQDNB2VIXFXHWMA https://security.gentoo.org/glsa/202011-13 https://www.debian.org/security/2021/dsa-4837 https://www.saltstack.com/blog/on-november-3-2020-saltstack-publicl • CWE-732: Incorrect Permission Assignment for Critical Resource •