Описание
Salt's junos execution module contained an unsafe YAML decode/load usage. A specially crafted YAML payload processed by the junos module could lead to unintended code execution under the context of the Salt process.
Пакеты
| Пакет | Статус | Версия исправления | Релиз | Тип |
|---|---|---|---|---|
| salt | removed | package |
EPSS
Процентиль: 1%
0.00009
Низкий
Связанные уязвимости
CVSS3: 7.8
ubuntu
8 дней назад
Salt's junos execution module contained an unsafe YAML decode/load usage. A specially crafted YAML payload processed by the junos module could lead to unintended code execution under the context of the Salt process.
CVSS3: 7.8
nvd
8 дней назад
Salt's junos execution module contained an unsafe YAML decode/load usage. A specially crafted YAML payload processed by the junos module could lead to unintended code execution under the context of the Salt process.
CVSS3: 7.8
github
8 дней назад
Salt junos Module Vulnerable to Code Injection via Specially Crafted YAML Payload
EPSS
Процентиль: 1%
0.00009
Низкий