7.5
CVSSv2

CVE-2013-4438

Published: 05/11/2013 Updated: 07/11/2013
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Salt (aka SaltStack) prior to 0.17.1 allows remote malicious users to execute arbitrary YAML code via unspecified vectors. NOTE: the vendor states that this might not be a vulnerability because the YAML to be loaded has already been determined to be safe.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

saltstack salt 0.16.4

saltstack salt 0.16.3

saltstack salt 0.16.2

saltstack salt 0.16.0

saltstack salt 0.9.8

saltstack salt 0.9.7

saltstack salt 0.9.6

saltstack salt 0.9.5

saltstack salt 0.9.4

saltstack salt 0.12.0

saltstack salt 0.11.0

saltstack salt 0.10.5

saltstack salt 0.10.4

saltstack salt 0.8.8

saltstack salt 0.8.7

saltstack salt 0.8.0

saltstack salt 0.7.0

saltstack salt 0.15.0

saltstack salt 0.13.0

saltstack salt 0.10.3

saltstack salt 0.10.0

saltstack salt 0.9.3

saltstack salt 0.9.0

saltstack salt

saltstack salt 0.15.1

saltstack salt 0.14.0

saltstack salt 0.10.2

saltstack salt 0.9.9

saltstack salt 0.9.2

saltstack salt 0.8.9

saltstack salt 0.6.0

Vendor Advisories

Debian Bug report logs - #726480 salt: Multiple security issues Package: salt; Maintainer for salt is Debian Salt Team <pkg-salt-team@listsaliothdebianorg>; Reported by: Moritz Muehlenhoff <jmm@inutilorg> Date: Wed, 16 Oct 2013 06:39:02 UTC Severity: grave Tags: security Fixed in version salt/0171+dfsg-1 Done ...