An issue in SaltStack Salt before 3002.5 allows local privilege escalation via crafted process name
Reporter | Title | Published | Views | Family All 79 |
---|---|---|---|---|
![]() | SaltStack Salt Command Injection Vulnerability (CNVD-2021-15056) | 1 Mar 202100:00 | – | cnvd |
![]() | OS Command Injection | 1 Mar 202106:07 | – | veracode |
![]() | Command injection | 27 Feb 202105:15 | – | prion |
![]() | SaltStack Salt command injection via a crafted process name | 24 May 202217:43 | – | github |
![]() | CVE-2020-28243 | 27 Feb 202105:15 | – | debiancve |
![]() | GHSA-PHHW-3WC9-8Q75 SaltStack Salt command injection via a crafted process name | 24 May 202217:43 | – | osv |
![]() | CVE-2020-28243 | 27 Feb 202105:15 | – | osv |
![]() | UBUNTU-CVE-2020-28243 | 27 Feb 202105:15 | – | osv |
![]() | PYSEC-2021-73 | 27 Feb 202105:15 | – | osv |
![]() | SUSE-SU-2021:0626-1 Security update for py26-compat-salt | 26 Feb 202110:11 | – | osv |
Parameter | Position | Path | Description | CWE |
---|---|---|---|---|
process name | path | restartcheck.restartcheck | Command injection vulnerability allowing privilege escalation via crafted process names. | CWE-77 |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo