Page 4 of 19 results (0.009 seconds)

CVSS: 9.8EPSS: 85%CPEs: 21EXPL: 2

An issue was discovered in through SaltStack Salt before 3002.5. salt-api does not honor eauth credentials for the wheel_async client. Thus, an attacker can remotely run any wheel modules on the master. Se detectó un problema por medio de SaltStack Salt versiones anteriores a 3002.5. salt-api no respeta las credenciales de eauth para el cliente wheel_async. Por lo tanto, un atacante puede ejecutar remotamente cualquier módulo wheel en el maestro • https://github.com/Immersive-Labs-Sec/CVE-2021-25281 http://packetstormsecurity.com/files/162058/SaltStack-Salt-API-Unauthenticated-Remote-Command-Execution.html https://github.com/saltstack/salt/releases https://lists.debian.org/debian-lts-announce/2021/11/msg00009.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7GRVZ5WAEI3XFN2BDTL6DDXFS5HYSDVB https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FUGLOJ6NXLCIFRD2JTXBYQEMAEF2B6XH https://list • CWE-287: Improper Authentication •

CVSS: 9.8EPSS: 51%CPEs: 16EXPL: 0

In SaltStack Salt through 3002, salt-netapi improperly validates eauth credentials and tokens. A user can bypass authentication and invoke Salt SSH. En SaltStack Salt versiones hasta 3002, salt-netapi comprueba inapropiadamente credenciales y tokens de eauth. Un usuario puede omitir la autenticación e invocar Salt SSH • http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00029.html http://packetstormsecurity.com/files/160039/SaltStack-Salt-REST-API-Arbitrary-Command-Execution.html https://docs.saltstack.com/en/latest/topics/releases/index.html https://lists.debian.org/debian-lts-announce/2020/12/msg00007.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TPOGB2F6XUAIGFDTOCQDNB2VIXFXHWMA https://security.gentoo.org/glsa/202011-13 https://www.debian.org/security/2021/dsa& • CWE-287: Improper Authentication •

CVSS: 5.5EPSS: 0%CPEs: 16EXPL: 0

The TLS module within SaltStack Salt through 3002 creates certificates with weak file permissions. El módulo TLS dentro de SaltStack Salt versiones hasta 3002, crea certificados con permisos de archivo débiles • http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00029.html https://docs.saltstack.com/en/latest/topics/releases/index.html#latest-branch-release https://lists.debian.org/debian-lts-announce/2020/12/msg00007.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TPOGB2F6XUAIGFDTOCQDNB2VIXFXHWMA https://security.gentoo.org/glsa/202011-13 https://www.debian.org/security/2021/dsa-4837 https://www.saltstack.com/blog/on-november-3-2020-saltstack-publicl • CWE-732: Incorrect Permission Assignment for Critical Resource •

CVSS: 9.8EPSS: 96%CPEs: 16EXPL: 1

An issue was discovered in SaltStack Salt through 3002. Sending crafted web requests to the Salt API, with the SSH client enabled, can result in shell injection. Se detectó un problema en SaltStack Salt versiones hasta 3002. El envío de peticiones web diseñadas a la Salt API, con el cliente SSH habilitado, puede resultar en una inyección shell This vulnerability allows remote attackers to execute arbitrary code on affected installations of SaltStack Salt. Authentication is not required to exploit this vulnerability. The specific flaw exists within the rest_cherrypy module. • https://github.com/zomy22/CVE-2020-16846-Saltstack-Salt-API http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00029.html http://packetstormsecurity.com/files/160039/SaltStack-Salt-REST-API-Arbitrary-Command-Execution.html https://github.com/saltstack/salt/releases https://lists.debian.org/debian-lts-announce/2020/12/msg00007.html https://lists.debian.org/debian-lts-announce/2022/01/msg00000.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •