Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-fcr4-h6c4-rvvp

Опубликовано: 13 июн. 2025
Источник: github
Github: Прошло ревью
CVSS3: 6.7

Описание

Salt's on demand pillar functionality vulnerable to arbitrary command injections

An attacker with access to a minion key can exploit the 'on demand' pillar functionality with a specially crafted git url which could cause and arbitrary command to be run on the master with the same privileges as the master process.

Пакеты

Наименование

salt

pip
Затронутые версииВерсия исправления

>= 3006.0rc1, < 3006.12

3006.12

Наименование

salt

pip
Затронутые версииВерсия исправления

>= 3007.0rc1, < 3007.4

3007.4

EPSS

Процентиль: 8%
0.00033
Низкий

6.7 Medium

CVSS3

Дефекты

CWE-77

Связанные уязвимости

CVSS3: 6.7
ubuntu
3 месяца назад

An attacker with access to a minion key can exploit the 'on demand' pillar functionality with a specially crafted git url which could cause and arbitrary command to be run on the master with the same privileges as the master process.

CVSS3: 6.7
nvd
3 месяца назад

An attacker with access to a minion key can exploit the 'on demand' pillar functionality with a specially crafted git url which could cause and arbitrary command to be run on the master with the same privileges as the master process.

CVSS3: 6.7
debian
3 месяца назад

An attacker with access to a minion key can exploit the 'on demand' pi ...

CVSS3: 8.1
redos
20 дней назад

Множественные уязвимости salt

CVSS3: 8.1
redos
20 дней назад

Множественные уязвимости salt3006

EPSS

Процентиль: 8%
0.00033
Низкий

6.7 Medium

CVSS3

Дефекты

CWE-77