Описание
Salt's junos execution module contained an unsafe YAML decode/load usage. A specially crafted YAML payload processed by the junos module could lead to unintended code execution under the context of the Salt process.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | DNE | |
| esm-apps/bionic | needs-triage | |
| esm-apps/jammy | needs-triage | |
| esm-apps/xenial | needs-triage | |
| esm-infra-legacy/trusty | needs-triage | |
| jammy | needs-triage | |
| noble | DNE | |
| questing | DNE | |
| upstream | needs-triage |
Показывать по
10
7.8 High
CVSS3
Связанные уязвимости
CVSS3: 7.8
nvd
8 дней назад
Salt's junos execution module contained an unsafe YAML decode/load usage. A specially crafted YAML payload processed by the junos module could lead to unintended code execution under the context of the Salt process.
CVSS3: 7.8
debian
8 дней назад
Salt's junos execution module contained an unsafe YAML decode/load usa ...
CVSS3: 7.8
github
8 дней назад
Salt junos Module Vulnerable to Code Injection via Specially Crafted YAML Payload
7.8 High
CVSS3