Show filters
66 Total Results
Displaying 1-10 of 66
Sort by:
Attacker Value
Very High

CVE-2020-11651

Disclosure Date: April 30, 2020 (last updated February 21, 2025)
An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2. The salt-master process ClearFuncs class does not properly validate method calls. This allows a remote user to access some methods without authentication. These methods can be used to retrieve user tokens from the salt master and/or run arbitrary commands on salt minions.
Attacker Value
High

CVE-2021-25281

Disclosure Date: February 27, 2021 (last updated February 22, 2025)
An issue was discovered in through SaltStack Salt before 3002.5. salt-api does not honor eauth credentials for the wheel_async client. Thus, an attacker can remotely run any wheel modules on the master.
Attacker Value
Very High

CVE-2020-25592 — SaltStack Authentication Bypass and Salt SSH Command Execution

Disclosure Date: November 06, 2020 (last updated February 22, 2025)
In SaltStack Salt through 3002, salt-netapi improperly validates eauth credentials and tokens. A user can bypass authentication and invoke Salt SSH.
Attacker Value
Very High

CVE-2020-16846 — SaltStack Unauthenticated Shell Injection

Disclosure Date: November 06, 2020 (last updated February 22, 2025)
An issue was discovered in SaltStack Salt through 3002. Sending crafted web requests to the Salt API, with the SSH client enabled, can result in shell injection.
Attacker Value
Unknown

CVE-2023-34049

Disclosure Date: November 14, 2024 (last updated November 14, 2024)
The Salt-SSH pre-flight option copies the script to the target at a predictable path, which allows an attacker to force Salt-SSH to run their script. If an attacker has access to the target VM and knows the path to the pre-flight script before it runs they can ensure Salt-SSH runs their script with the privileges of the user running Salt-SSH. Do not make the copy path on the target predictable and ensure we check return codes of the scp command if the copy fails.
0
Attacker Value
Unknown

CVE-2024-47818

Disclosure Date: October 07, 2024 (last updated October 08, 2024)
Saltcorn is an extensible, open source, no-code database application builder. A logged-in user with any role can delete arbitrary files on the filesystem by calling the `sync/clean_sync_dir` endpoint. The `dir_name` POST parameter is not validated/sanitized and is used to construct the `syncDir` that is deleted by calling `fs.rm`. This issue has been addressed in release version 1.0.0-beta16 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
0
Attacker Value
Unknown

CVE-2024-22232

Disclosure Date: June 27, 2024 (last updated June 27, 2024)
A specially crafted url can be created which leads to a directory traversal in the salt file server. A malicious user can read an arbitrary file from a Salt master’s filesystem.
0
Attacker Value
Unknown

CVE-2024-22231

Disclosure Date: June 27, 2024 (last updated June 27, 2024)
Syndic cache directory creation is vulnerable to a directory traversal attack in salt project which can lead a malicious attacker to create an arbitrary directory on a Salt master.
0
Attacker Value
Unknown

CVE-2023-20898

Disclosure Date: September 05, 2023 (last updated February 14, 2025)
Git Providers can read from the wrong environment because they get the same cache directory base name in Salt masters prior to 3005.2 or 3006.2. Anything that uses Git Providers with different environments can get garbage data or the wrong data, which can lead to wrongful data disclosure, wrongful executions, data corruption and/or crash.
Attacker Value
Unknown

CVE-2023-20897

Disclosure Date: September 05, 2023 (last updated February 14, 2025)
Salt masters prior to 3005.2 or 3006.2 contain a DOS in minion return. After receiving several bad packets on the request server equal to the number of worker threads, the master will become unresponsive to return requests until restarted.