Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-3148

Опубликовано: 27 фев. 2021
Источник: debian
EPSS Средний

Описание

An issue was discovered in SaltStack Salt before 3002.5. Sending crafted web requests to the Salt API can result in salt.utils.thin.gen_thin() command injection because of different handling of single versus double quotes. This is related to salt/utils/thin.py.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
saltfixed3002.5+dfsg1-1package
saltfixed2018.3.4+dfsg1-6+deb10u3busterpackage

Примечания

  • https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/

  • Introduced by: https://github.com/saltstack/salt/commit/fc9267afa3a7ecaae3ef446575072e0e5d51d8b7 (v2016.3)

  • Fixed by: https://github.com/saltstack/salt/commit/6ae64c6b15cb7f43b57f564a0cb8a0e426cc183a (v3000.7 backport)

EPSS

Процентиль: 94%
0.12138
Средний

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 5 лет назад

An issue was discovered in SaltStack Salt before 3002.5. Sending crafted web requests to the Salt API can result in salt.utils.thin.gen_thin() command injection because of different handling of single versus double quotes. This is related to salt/utils/thin.py.

CVSS3: 6.8
redhat
почти 5 лет назад

An issue was discovered in SaltStack Salt before 3002.5. Sending crafted web requests to the Salt API can result in salt.utils.thin.gen_thin() command injection because of different handling of single versus double quotes. This is related to salt/utils/thin.py.

CVSS3: 9.8
nvd
почти 5 лет назад

An issue was discovered in SaltStack Salt before 3002.5. Sending crafted web requests to the Salt API can result in salt.utils.thin.gen_thin() command injection because of different handling of single versus double quotes. This is related to salt/utils/thin.py.

CVSS3: 9.8
github
больше 3 лет назад

SaltStack Salt command injection in the Salt-API when using the Salt-SSH client

CVSS3: 9.8
fstec
почти 5 лет назад

Уязвимость функции salt.utils.thin.gen_thin() системы управления конфигурациями и удалённого выполнения операций SaltStack Salt, позволяющая нарушителю выполнять произвольные команды в целевой системе

EPSS

Процентиль: 94%
0.12138
Средний