GHSA-x549-r7m8-gv63

Suggest an improvement
Source
https://github.com/advisories/GHSA-x549-r7m8-gv63
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-x549-r7m8-gv63/GHSA-x549-r7m8-gv63.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-x549-r7m8-gv63
Aliases
Published
2022-05-13T01:23:13Z
Modified
2024-10-23T19:20:54.494065Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
SaltStack Salt Remote command execution and incorrect access control when using salt-api
Details

SaltStack Salt 2016.11.x before 2016.11.10, 2017.7.x before 2017.7.8 and 2018.3.x before 2018.3.3 allow remote attackers to bypass authentication and execute arbitrary commands via salt-api(netapi).

References

Affected packages

PyPI / salt

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2017.7.0
Fixed
2017.7.8

Affected versions

2017.*

2017.7.0
2017.7.1
2017.7.2
2017.7.3
2017.7.4
2017.7.5
2017.7.6
2017.7.7

PyPI / salt

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2018.3.0
Fixed
2018.3.3

Affected versions

2018.*

2018.3.0
2018.3.1
2018.3.2

PyPI / salt

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2016.11.0
Fixed
2016.11.10

Affected versions

2016.*

2016.11.0
2016.11.1
2016.11.2
2016.11.3
2016.11.4
2016.11.5
2016.11.6
2016.11.7
2016.11.8
2016.11.9