Vulnerabilities (CVE)

Filtered by vendor Saltstack Subscribe
Filtered by product Salt
Total 51 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2015-1839 2 Fedoraproject, Saltstack 2 Fedora, Salt 2017-04-19 4.6 MEDIUM 5.3 MEDIUM
modules/chef.py in SaltStack before 2014.7.4 does not properly handle files in /tmp.
CVE-2015-1838 2 Fedoraproject, Saltstack 2 Fedora, Salt 2017-04-19 4.6 MEDIUM 5.3 MEDIUM
modules/serverdensity_device.py in SaltStack before 2014.7.4 does not properly handle files in /tmp.
CVE-2015-8034 1 Saltstack 1 Salt 2017-03-02 2.1 LOW 3.3 LOW
The state.sls function in Salt before 2015.8.3 uses weak permissions on the cache data, which allows local users to obtain sensitive information by reading the file.
CVE-2016-9639 1 Saltstack 1 Salt 2017-02-09 7.5 HIGH 9.1 CRITICAL
Salt before 2015.8.11 allows deleted minions to read or write to minions with the same id, related to caching.
CVE-2016-3176 1 Saltstack 1 Salt 2017-02-07 4.3 MEDIUM 5.6 MEDIUM
Salt before 2015.5.10 and 2015.8.x before 2015.8.8, when PAM external authentication is enabled, allows attackers to bypass the configured authentication service by passing an alternate service with a command sent to LocalClient.
CVE-2013-4435 1 Saltstack 1 Salt 2013-11-07 6.0 MEDIUM N/A
Salt (aka SaltStack) 0.15.0 through 0.17.0 allows remote authenticated users who are using external authentication or client ACL to execute restricted routines by embedding the routine in another routine.
CVE-2013-4436 1 Saltstack 1 Salt 2013-11-07 9.3 HIGH N/A
The default configuration for salt-ssh in Salt (aka SaltStack) 0.17.0 does not validate the SSH host key of requests, which allows remote attackers to have unspecified impact via a man-in-the-middle (MITM) attack.
CVE-2013-4437 1 Saltstack 1 Salt 2013-11-07 10.0 HIGH N/A
Unspecified vulnerability in salt-ssh in Salt (aka SaltStack) 0.17.0 has unspecified impact and vectors related to "insecure Usage of /tmp."
CVE-2013-4438 1 Saltstack 1 Salt 2013-11-07 7.5 HIGH N/A
Salt (aka SaltStack) before 0.17.1 allows remote attackers to execute arbitrary YAML code via unspecified vectors. NOTE: the vendor states that this might not be a vulnerability because the YAML to be loaded has already been determined to be safe.
CVE-2013-4439 1 Saltstack 1 Salt 2013-11-07 4.9 MEDIUM N/A
Salt (aka SaltStack) before 0.15.0 through 0.17.0 allows remote authenticated minions to impersonate arbitrary minions via a crafted minion with a valid key.
CVE-2013-6617 1 Saltstack 1 Salt 2013-11-06 10.0 HIGH N/A
The salt master in Salt (aka SaltStack) 0.11.0 through 0.17.0 does not properly drop group privileges, which makes it easier for remote attackers to gain privileges.