Описание
An attacker with access to a minion key can exploit the 'on demand' pillar functionality with a specially crafted git url which could cause and arbitrary command to be run on the master with the same privileges as the master process.
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-apps/bionic | needs-triage | |
esm-apps/jammy | needs-triage | |
esm-apps/xenial | needs-triage | |
esm-infra-legacy/trusty | needs-triage | |
jammy | needs-triage | |
noble | DNE | |
oracular | DNE | |
plucky | DNE | |
upstream | needs-triage |
Показывать по
EPSS
6.7 Medium
CVSS3
Связанные уязвимости
An attacker with access to a minion key can exploit the 'on demand' pillar functionality with a specially crafted git url which could cause and arbitrary command to be run on the master with the same privileges as the master process.
An attacker with access to a minion key can exploit the 'on demand' pi ...
Salt's on demand pillar functionality vulnerable to arbitrary command injections
EPSS
6.7 Medium
CVSS3