Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-5200

Опубликовано: 20 янв. 2017
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

Salt-api in SaltStack Salt before 2015.8.13, 2016.3.x before 2016.3.5, and 2016.11.x before 2016.11.2 allows arbitrary command execution on a salt-master via Salt's ssh_client.

Отчет

This issue did not affect the versions of the salt as shipped with Red Hat Ceph Storage 1.3, Red Hat Ceph Storage 2, and Red Hat Storage Console 2 as salt-api and salt-ssh are not shipped with these products.

Меры по смягчению последствий

Disable salt-api for mitigation.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Ceph Storage 1.3saltNot affected
Red Hat Ceph Storage 2saltNot affected
Red Hat Storage Console 2saltNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=1418347salt: Salt-api allows arbitrary command execution on a salt-master via Salt's ssh_client

EPSS

Процентиль: 79%
0.01262
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
ubuntu
больше 8 лет назад

Salt-api in SaltStack Salt before 2015.8.13, 2016.3.x before 2016.3.5, and 2016.11.x before 2016.11.2 allows arbitrary command execution on a salt-master via Salt's ssh_client. Users of Salt-API and salt-ssh could execute a command on the salt master via a hole when both systems were enabled.

CVSS3: 8.8
nvd
больше 8 лет назад

Salt-api in SaltStack Salt before 2015.8.13, 2016.3.x before 2016.3.5, and 2016.11.x before 2016.11.2 allows arbitrary command execution on a salt-master via Salt's ssh_client.

CVSS3: 8.8
debian
больше 8 лет назад

Salt-api in SaltStack Salt before 2015.8.13, 2016.3.x before 2016.3.5, ...

CVSS3: 8.8
github
больше 3 лет назад

SaltStack Salt arbitrary command execution in Salt-api via ssh_client

suse-cvrf
больше 8 лет назад

Security update for Salt

EPSS

Процентиль: 79%
0.01262
Низкий

7.5 High

CVSS3