Логотип exploitDog
bind:CVE-2017-5192
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2017-5192

Количество 5

Количество 5

ubuntu логотип

CVE-2017-5192

больше 8 лет назад

When using the local_batch client from salt-api in SaltStack Salt before 2015.8.13, 2016.3.x before 2016.3.5, and 2016.11.x before 2016.11.2, external authentication is not respected, enabling all authentication to be bypassed. The LocalClient.cmd_batch() method client does not accept external_auth credentials and so access to it from salt-api has been removed for now. This vulnerability allows code execution for already-authenticated users and is only in effect when running salt-api as the root user.

CVSS3: 8.8
EPSS: Низкий
redhat логотип

CVE-2017-5192

около 9 лет назад

When using the local_batch client from salt-api in SaltStack Salt before 2015.8.13, 2016.3.x before 2016.3.5, and 2016.11.x before 2016.11.2, external authentication is not respected, enabling all authentication to be bypassed.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2017-5192

больше 8 лет назад

When using the local_batch client from salt-api in SaltStack Salt before 2015.8.13, 2016.3.x before 2016.3.5, and 2016.11.x before 2016.11.2, external authentication is not respected, enabling all authentication to be bypassed.

CVSS3: 8.8
EPSS: Низкий
debian логотип

CVE-2017-5192

больше 8 лет назад

When using the local_batch client from salt-api in SaltStack Salt befo ...

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-f2h7-4f84-8qrm

больше 3 лет назад

SaltStack Salt Authentication Bypass when using the local_batch client from salt-api

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2017-5192

When using the local_batch client from salt-api in SaltStack Salt before 2015.8.13, 2016.3.x before 2016.3.5, and 2016.11.x before 2016.11.2, external authentication is not respected, enabling all authentication to be bypassed. The LocalClient.cmd_batch() method client does not accept external_auth credentials and so access to it from salt-api has been removed for now. This vulnerability allows code execution for already-authenticated users and is only in effect when running salt-api as the root user.

CVSS3: 8.8
0%
Низкий
больше 8 лет назад
redhat логотип
CVE-2017-5192

When using the local_batch client from salt-api in SaltStack Salt before 2015.8.13, 2016.3.x before 2016.3.5, and 2016.11.x before 2016.11.2, external authentication is not respected, enabling all authentication to be bypassed.

CVSS3: 7.5
0%
Низкий
около 9 лет назад
nvd логотип
CVE-2017-5192

When using the local_batch client from salt-api in SaltStack Salt before 2015.8.13, 2016.3.x before 2016.3.5, and 2016.11.x before 2016.11.2, external authentication is not respected, enabling all authentication to be bypassed.

CVSS3: 8.8
0%
Низкий
больше 8 лет назад
debian логотип
CVE-2017-5192

When using the local_batch client from salt-api in SaltStack Salt befo ...

CVSS3: 8.8
0%
Низкий
больше 8 лет назад
github логотип
GHSA-f2h7-4f84-8qrm

SaltStack Salt Authentication Bypass when using the local_batch client from salt-api

CVSS3: 8.8
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу