Lucene search

K
SaltstackSalt

6 matches found

CVE
CVE
โ€ขadded 2022/06/23 5:15 p.m.โ€ข832 views

CVE-2022-22967

An issue was discovered in SaltStack Salt in versions before 3002.9, 3003.5, 3004.2. PAM auth fails to reject locked accounts, which allows a previously authorized user whose account is locked still run Salt commands when their account is locked. This affects both local shell accounts with an activ...

8.8CVSS8.3AI score0.00444EPSS
CVE
CVE
โ€ขadded 2022/03/29 5:15 p.m.โ€ข170 views

CVE-2022-22934

An issue was discovered in SaltStack Salt in versions before 3002.8, 3003.4, 3004.1. Salt Masters do not sign pillar data with the minionโ€™s public key, which can result in attackers substituting arbitrary pillar data.

8.8CVSS8.4AI score0.00095EPSS
CVE
CVE
โ€ขadded 2022/03/29 5:15 p.m.โ€ข155 views

CVE-2022-22936

An issue was discovered in SaltStack Salt in versions before 3002.8, 3003.4, 3004.1. Job publishes and file server replies are susceptible to replay attacks, which can result in an attacker replaying job publishes causing minions to run old jobs. File server replies can also be re-played. A suffici...

8.8CVSS8.4AI score0.00082EPSS
CVE
CVE
โ€ขadded 2022/03/29 5:15 p.m.โ€ข139 views

CVE-2022-22941

An issue was discovered in SaltStack Salt in versions before 3002.8, 3003.4, 3004.1. When configured as a Master-of-Masters, with a publisher_acl, if a user configured in the publisher_acl targets any minion connected to the Syndic, the Salt Master incorrectly interpreted no valid targets as valid,...

8.8CVSS8.4AI score0.00013EPSS
CVE
CVE
โ€ขadded 2017/09/26 2:29 p.m.โ€ข79 views

CVE-2017-5192

When using the local_batch client from salt-api in SaltStack Salt before 2015.8.13, 2016.3.x before 2016.3.5, and 2016.11.x before 2016.11.2, external authentication is not respected, enabling all authentication to be bypassed.

8.8CVSS8.5AI score0.00149EPSS
CVE
CVE
โ€ขadded 2016/04/12 2:59 p.m.โ€ข53 views

CVE-2016-1866

Salt 2015.8.x before 2015.8.4 does not properly handle clear messages on the minion, which allows man-in-the-middle attackers to execute arbitrary code by inserting packets into the minion-master data stream.

8.1CVSS8.2AI score0.00893EPSS