Lucene search

K
redosRedosROS-20240412-04
HistoryApr 12, 2024 - 12:00 a.m.

ROS-20240412-04

2024-04-1200:00:00
redos.red-soft.ru
8
salt
configuration management
remote execution
python library
gitpython
git repositories
urllib3 module
vulnerability
exploitation
unauthorized access
protected information
denial of service
unix

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

7.6 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

36.3%

A vulnerability in Salt’s configuration management and remote execution system is related to the
copying a script along a predictable path. Exploitation of the vulnerability could allow an attacker,
acting remotely to run their own script.

A vulnerability in the symbolic.py component of the Python library for interacting with GitPython git repositories
is related to a flaw in the directory path name restriction. Exploitation of the vulnerability could allow
an attacker acting remotely to gain unauthorized access to protected information or to cause a denial of service.
cause a denial of service

Vulnerability in the urllib3 module of the Python programming language interpreter is related to the lack of protection of service data.
of service data. Exploitation of the vulnerability could allow an attacker acting remotely to disclose protected information or cause a denial of service.
protected information

OSVersionArchitecturePackageVersionFilename
redos7.3x86_64salt<= 3006.6-1UNKNOWN

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

7.6 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

36.3%