Page 6 of 29 results (0.012 seconds)

CVSS: 5.3EPSS: 0%CPEs: 2EXPL: 0

Directory Traversal vulnerability in salt-api in SaltStack Salt before 2017.7.8 and 2018.3.x before 2018.3.3 allows remote attackers to determine which files exist on the server. Vulnerabilidad de salto de directorio en salt-api en SaltStack Salt en versiones anteriores a la 2017.7.8 y versiones 2018.3.x anteriores a la 2018.3.3 permite que atacantes remotos determinen qué archivos existen en el servidor. • http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00070.html https://docs.saltstack.com/en/2017.7/topics/releases/2017.7.8.html https://docs.saltstack.com/en/latest/topics/releases/2018.3.3.html https://groups.google.com/d/msg/salt-users/L9xqcJ0UXxs/qgDj42obBQAJ https://groups.google.com/d/msg/salt-users/dimVF7rpphY/jn3Xv3MbBQAJ https://lists.debian.org/debian-lts-announce/2020/07/msg00024.html https://usn.ubuntu.com/4459-1 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 9.8EPSS: 0%CPEs: 15EXPL: 0

Directory traversal vulnerability in minion id validation in SaltStack Salt before 2016.3.8, 2016.11.x before 2016.11.8, and 2017.7.x before 2017.7.2 allows remote minions with incorrect credentials to authenticate to a master via a crafted minion ID. NOTE: this vulnerability exists because of an incomplete fix for CVE-2017-12791. Una vulnerabilidad de salto de directorio en la validación minion id en SaltStack Salt en versiones anteriores a la 2016.3.8, en versiones 2016.11.x anteriores a la 2016.11.8 y versiones 2017.7.x anteriores a la 2017.7.2 permite que minions remotos con credenciales incorrectas se autentiquen en un master mediante un ID minion manipulado. NOTA: Esta vulnerabilidad existe debido a una solución incompleta para CVE-2017-12791. • http://lists.opensuse.org/opensuse-updates/2017-10/msg00073.html http://lists.opensuse.org/opensuse-updates/2017-10/msg00075.html https://bugzilla.redhat.com/show_bug.cgi?id=1500748 https://docs.saltstack.com/en/latest/topics/releases/2016.11.8.html https://docs.saltstack.com/en/latest/topics/releases/2016.3.8.html https://docs.saltstack.com/en/latest/topics/releases/2017.7.2.html https://github.com/saltstack/salt/commit/80d90307b07b3703428ecbb7c8bb468e28a9ae6d • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.5EPSS: 3%CPEs: 15EXPL: 0

SaltStack Salt before 2016.3.8, 2016.11.x before 2016.11.8, and 2017.7.x before 2017.7.2 allows remote attackers to cause a denial of service via a crafted authentication request. SaltStack Salt en versiones anteriores a la 2016.3.8, en versiones 2016.11.x anteriores a la 2016.11.8 y versiones 2017.7.x anteriores a la 2017.7.2 permite que atacantes remotos provoquen una denegación de servicio (DoS) mediante una petición de autenticación manipulada. • http://lists.opensuse.org/opensuse-updates/2017-10/msg00073.html http://lists.opensuse.org/opensuse-updates/2017-10/msg00075.html https://bugzilla.redhat.com/show_bug.cgi?id=1500742 https://docs.saltstack.com/en/latest/topics/releases/2016.11.8.html https://docs.saltstack.com/en/latest/topics/releases/2016.3.8.html https://docs.saltstack.com/en/latest/topics/releases/2017.7.2.html https://github.com/saltstack/salt/commit/5f8b5e1a0f23fe0f2be5b3c3e04199b57a53db5b • CWE-20: Improper Input Validation •

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 0

Directory traversal vulnerability in minion id validation in SaltStack Salt before 2016.11.7 and 2017.7.x before 2017.7.1 allows remote minions with incorrect credentials to authenticate to a master via a crafted minion ID. Una vulnerabilidad de salto de directorio en la validación minion id en SaltStack Salt en versiones anteriores a la 2016.11.7 y 2017.7.x en versiones anteriores a la 2017.7.1 permite que minions remotos con credenciales incorrectas se autentiquen en un master mediante un ID minion manipulado. • http://www.securityfocus.com/bid/100384 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=872399 https://bugzilla.redhat.com/show_bug.cgi?id=1482006 https://docs.saltstack.com/en/2016.11/topics/releases/2016.11.7.html https://docs.saltstack.com/en/latest/topics/releases/2017.7.1.html https://github.com/saltstack/salt/pull/42944 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •