Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
saltstack salt vulnerabilities and exploits
(subscribe to this query)
668
VMScore
CVE-2020-25592
In SaltStack Salt through 3002, salt-netapi improperly validates eauth credentials and tokens. A user can bypass authentication and invoke Salt SSH.
Saltstack Salt 3001
Saltstack Salt
Debian Debian Linux 9.0
Debian Debian Linux 10.0
1 Github repository
1 Article
668
VMScore
CVE-2020-16846
An issue exists in SaltStack Salt up to and including 3002. Sending crafted web requests to the Salt API, with the SSH client enabled, can result in shell injection.
Saltstack Salt 3001
Saltstack Salt
Debian Debian Linux 9.0
Debian Debian Linux 10.0
2 Github repositories
1 Article
668
VMScore
CVE-2019-1010259
SaltStack Salt 2018.3, 2019.2 is affected by: SQL Injection. The impact is: An attacker could escalate privileges on MySQL server deployed by cloud provider. It leads to RCE. The component is: The mysql.user_chpass function from the MySQL module for Salt. The attack vector is: sp...
Saltstack Salt 2018 3.0
Saltstack Salt 2019 2.0
668
VMScore
CVE-2018-15751
SaltStack Salt prior to 2017.7.8 and 2018.3.x prior to 2018.3.3 allow remote malicious users to bypass authentication and execute arbitrary commands via salt-api(netapi).
Saltstack Salt
668
VMScore
CVE-2017-7893
In SaltStack Salt prior to 2016.3.6, compromised salt-minions can impersonate the salt-master.
Saltstack Salt
668
VMScore
CVE-2017-14695
Directory traversal vulnerability in minion id validation in SaltStack Salt prior to 2016.3.8, 2016.11.x prior to 2016.11.8, and 2017.7.x prior to 2017.7.2 allows remote minions with incorrect credentials to authenticate to a master via a crafted minion ID. NOTE: this vulnerabili...
Saltstack Salt 2016.11.0
Saltstack Salt 2016.11
Saltstack Salt
Saltstack Salt 2017.7.0
Saltstack Salt 2016.11.2
Saltstack Salt 2016.11.1
Saltstack Salt 2016.11.7
Saltstack Salt 2016.11.6
Saltstack Salt 2016.11.5
Saltstack Salt 2016.11.4
Saltstack Salt 2017.7.1
Saltstack Salt 2016.11.3
668
VMScore
CVE-2017-12791
Directory traversal vulnerability in minion id validation in SaltStack Salt prior to 2016.11.7 and 2017.7.x prior to 2017.7.1 allows remote minions with incorrect credentials to authenticate to a master via a crafted minion ID.
Saltstack Salt 2017.7.0
Saltstack Salt
668
VMScore
CVE-2013-4438
Salt (aka SaltStack) prior to 0.17.1 allows remote malicious users to execute arbitrary YAML code via unspecified vectors. NOTE: the vendor states that this might not be a vulnerability because the YAML to be loaded has already been determined to be safe.
Saltstack Salt 0.16.4
Saltstack Salt 0.16.3
Saltstack Salt 0.16.2
Saltstack Salt 0.16.0
Saltstack Salt 0.9.8
Saltstack Salt 0.9.7
Saltstack Salt 0.9.6
Saltstack Salt 0.9.5
Saltstack Salt 0.9.4
Saltstack Salt 0.12.0
Saltstack Salt 0.11.0
Saltstack Salt 0.10.5
Saltstack Salt 0.10.4
Saltstack Salt 0.8.8
Saltstack Salt 0.8.7
Saltstack Salt 0.8.0
Saltstack Salt 0.7.0
Saltstack Salt 0.15.0
Saltstack Salt 0.13.0
Saltstack Salt 0.10.3
Saltstack Salt 0.10.0
Saltstack Salt 0.9.3
641
VMScore
CVE-2014-3563
Multiple unspecified vulnerabilities in Salt (aka SaltStack) prior to 2014.1.10 allow local users to have an unspecified impact via vectors related to temporary file creation in (1) seed.py, (2) salt-ssh, or (3) salt-cloud.
Saltstack Salt
632
VMScore
CVE-2021-21996
An issue exists in SaltStack Salt prior to 3003.3. A user who has control of the source, and source_hash URLs can gain full file system access as root on a salt minion.
Saltstack Salt
Fedoraproject Fedora 33
Fedoraproject Fedora 34
Fedoraproject Fedora 35
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Debian Debian Linux 11.0
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5324
path traversal
CVE-2024-4743
CVE-2024-5184
TCP
CVE-2024-27822
code injection
CVE-2024-28995
CVE-2023-20938
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
NEXT »