Directory Traversal vulnerability in salt-api in SaltStack Salt before 2017.7.8 and 2018.3.x before 2018.3.3 allows remote attackers to determine which files exist on the server.
References
Link | Resource |
---|---|
https://groups.google.com/d/msg/salt-users/L9xqcJ0UXxs/qgDj42obBQAJ | Release Notes Third Party Advisory |
https://groups.google.com/d/msg/salt-users/dimVF7rpphY/jn3Xv3MbBQAJ | Release Notes Third Party Advisory |
https://docs.saltstack.com/en/latest/topics/releases/2018.3.3.html | Release Notes Vendor Advisory |
https://docs.saltstack.com/en/2017.7/topics/releases/2017.7.8.html | Release Notes Vendor Advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00070.html | |
https://lists.debian.org/debian-lts-announce/2020/07/msg00024.html | |
https://usn.ubuntu.com/4459-1/ |
Configurations
Configuration 1 (hide)
|
Information
Published : 2018-10-24 15:29
Updated : 2020-08-19 18:17
NVD link : CVE-2018-15750
Mitre link : CVE-2018-15750
JSON object : View
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
saltstack
- salt