Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
saltstack salt vulnerabilities and exploits
(subscribe to this query)
6.8
CVSSv2
CVE-2019-17361
In SaltStack Salt up to and including 2019.2.0, the salt-api NET API with the ssh client enabled is vulnerable to command injection. This allows an unauthenticated attacker with network access to the API endpoint to execute arbitrary code on the salt-api host.
Saltstack Salt
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Opensuse Leap 15.1
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 16.04
6.8
CVSSv2
CVE-2016-1866
Salt 2015.8.x prior to 2015.8.4 does not properly handle clear messages on the minion, which allows man-in-the-middle malicious users to execute arbitrary code by inserting packets into the minion-master data stream.
Saltstack Salt 2015.8.3
Saltstack Salt 2015.8.1
Saltstack Salt 2015.8.2
Saltstack Salt 2015.8.0
Opensuse Leap 42.1
6.5
CVSSv2
CVE-2022-22967
An issue exists in SaltStack Salt in versions prior to 3002.9, 3003.5, 3004.2. PAM auth fails to reject locked accounts, which allows a previously authorized user whose account is locked still run Salt commands when their account is locked. This affects both local shell accounts ...
Saltstack Salt
6.5
CVSSv2
CVE-2017-5192
When using the local_batch client from salt-api in SaltStack Salt prior to 2015.8.13, 2016.3.x prior to 2016.3.5, and 2016.11.x prior to 2016.11.2, external authentication is not respected, enabling all authentication to be bypassed.
Saltstack Salt 2016.3.3
Saltstack Salt
Saltstack Salt 2016.11.0
Saltstack Salt 2016.11.1
Saltstack Salt 2016.11.2
Saltstack Salt 2016.3.0
Saltstack Salt 2016.3.1
Saltstack Salt 2016.3.2
Saltstack Salt 2016.3.4
6.4
CVSSv2
CVE-2021-25282
An issue exists in through SaltStack Salt prior to 3002.5. The salt.wheel.pillar_roots.write method is vulnerable to directory traversal.
Saltstack Salt
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Fedoraproject Fedora 34
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Debian Debian Linux 11.0
1 Github repository
6
CVSSv2
CVE-2022-22941
An issue exists in SaltStack Salt in versions prior to 3002.8, 3003.4, 3004.1. When configured as a Master-of-Masters, with a publisher_acl, if a user configured in the publisher_acl targets any minion connected to the Syndic, the Salt Master incorrectly interpreted no valid targ...
Saltstack Salt
6
CVSSv2
CVE-2013-4435
Salt (aka SaltStack) 0.15.0 up to and including 0.17.0 allows remote authenticated users who are using external authentication or client ACL to execute restricted routines by embedding the routine in another routine.
Saltstack Salt 0.15.0
Saltstack Salt 0.15.1
Saltstack Salt 0.17.0
Saltstack Salt 0.16.0
Saltstack Salt 0.16.3
Saltstack Salt 0.16.2
Saltstack Salt 0.16.4
5.8
CVSSv2
CVE-2022-22934
An issue exists in SaltStack Salt in versions prior to 3002.8, 3003.4, 3004.1. Salt Masters do not sign pillar data with the minion’s public key, which can result in attackers substituting arbitrary pillar data.
Saltstack Salt
5.8
CVSSv2
CVE-2020-35662
In SaltStack Salt prior to 3002.5, when authenticating to services using certain modules, the SSL certificate is not always validated.
Saltstack Salt
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Fedoraproject Fedora 34
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Debian Debian Linux 11.0
5.4
CVSSv2
CVE-2022-22936
An issue exists in SaltStack Salt in versions prior to 3002.8, 3003.4, 3004.1. Job publishes and file server replies are susceptible to replay attacks, which can result in an attacker replaying job publishes causing minions to run old jobs. File server replies can also be re-play...
Saltstack Salt
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
NULL pointer dereference
CVE-2023-52689
CVE-2024-23803
client side
CVE-2023-52696
information disclosure
CVE-2024-35843
CVE-2024-27130
CVE-2023-52697
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
NEXT »