Filtered by vendor Saltstack
Subscribe
Total
53 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2015-6941 | 1 Saltstack | 1 Salt 2015 | 2017-08-21 | 5.0 MEDIUM | 9.8 CRITICAL |
win_useradd, salt-cloud and the Linode driver in salt 2015.5.x before 2015.5.6, and 2015.8.x before 2015.8.1 leak password information in debug logs. | |||||
CVE-2017-8109 | 1 Saltstack | 1 Salt | 2017-05-05 | 2.1 LOW | 7.8 HIGH |
The salt-ssh minion code in SaltStack Salt 2016.11 before 2016.11.4 copied over configuration from the Salt Master without adjusting permissions, which might leak credentials to local attackers on configured minions (clients). | |||||
CVE-2015-1839 | 2 Fedoraproject, Saltstack | 2 Fedora, Salt | 2017-04-19 | 4.6 MEDIUM | 5.3 MEDIUM |
modules/chef.py in SaltStack before 2014.7.4 does not properly handle files in /tmp. | |||||
CVE-2015-1838 | 2 Fedoraproject, Saltstack | 2 Fedora, Salt | 2017-04-19 | 4.6 MEDIUM | 5.3 MEDIUM |
modules/serverdensity_device.py in SaltStack before 2014.7.4 does not properly handle files in /tmp. | |||||
CVE-2015-8034 | 1 Saltstack | 1 Salt | 2017-03-01 | 2.1 LOW | 3.3 LOW |
The state.sls function in Salt before 2015.8.3 uses weak permissions on the cache data, which allows local users to obtain sensitive information by reading the file. | |||||
CVE-2016-9639 | 1 Saltstack | 1 Salt | 2017-02-09 | 7.5 HIGH | 9.1 CRITICAL |
Salt before 2015.8.11 allows deleted minions to read or write to minions with the same id, related to caching. | |||||
CVE-2016-3176 | 1 Saltstack | 1 Salt | 2017-02-07 | 4.3 MEDIUM | 5.6 MEDIUM |
Salt before 2015.5.10 and 2015.8.x before 2015.8.8, when PAM external authentication is enabled, allows attackers to bypass the configured authentication service by passing an alternate service with a command sent to LocalClient. | |||||
CVE-2013-4435 | 1 Saltstack | 1 Salt | 2013-11-07 | 6.0 MEDIUM | N/A |
Salt (aka SaltStack) 0.15.0 through 0.17.0 allows remote authenticated users who are using external authentication or client ACL to execute restricted routines by embedding the routine in another routine. | |||||
CVE-2013-4436 | 1 Saltstack | 1 Salt | 2013-11-07 | 9.3 HIGH | N/A |
The default configuration for salt-ssh in Salt (aka SaltStack) 0.17.0 does not validate the SSH host key of requests, which allows remote attackers to have unspecified impact via a man-in-the-middle (MITM) attack. | |||||
CVE-2013-4437 | 1 Saltstack | 1 Salt | 2013-11-07 | 10.0 HIGH | N/A |
Unspecified vulnerability in salt-ssh in Salt (aka SaltStack) 0.17.0 has unspecified impact and vectors related to "insecure Usage of /tmp." | |||||
CVE-2013-4438 | 1 Saltstack | 1 Salt | 2013-11-07 | 7.5 HIGH | N/A |
Salt (aka SaltStack) before 0.17.1 allows remote attackers to execute arbitrary YAML code via unspecified vectors. NOTE: the vendor states that this might not be a vulnerability because the YAML to be loaded has already been determined to be safe. | |||||
CVE-2013-4439 | 1 Saltstack | 1 Salt | 2013-11-06 | 4.9 MEDIUM | N/A |
Salt (aka SaltStack) before 0.15.0 through 0.17.0 allows remote authenticated minions to impersonate arbitrary minions via a crafted minion with a valid key. | |||||
CVE-2013-6617 | 1 Saltstack | 1 Salt | 2013-11-06 | 10.0 HIGH | N/A |
The salt master in Salt (aka SaltStack) 0.11.0 through 0.17.0 does not properly drop group privileges, which makes it easier for remote attackers to gain privileges. |