Vulnerabilities (CVE)

Filtered by vendor Saltstack Subscribe
Total 55 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2015-6941 1 Saltstack 1 Salt 2015 2025-04-20 5.0 MEDIUM 9.8 CRITICAL
win_useradd, salt-cloud and the Linode driver in salt 2015.5.x before 2015.5.6, and 2015.8.x before 2015.8.1 leak password information in debug logs.
CVE-2017-5200 1 Saltstack 1 Salt 2025-04-20 9.0 HIGH 8.8 HIGH
Salt-api in SaltStack Salt before 2015.8.13, 2016.3.x before 2016.3.5, and 2016.11.x before 2016.11.2 allows arbitrary command execution on a salt-master via Salt's ssh_client.
CVE-2017-5192 1 Saltstack 1 Salt 2025-04-20 6.5 MEDIUM 8.8 HIGH
When using the local_batch client from salt-api in SaltStack Salt before 2015.8.13, 2016.3.x before 2016.3.5, and 2016.11.x before 2016.11.2, external authentication is not respected, enabling all authentication to be bypassed.
CVE-2017-8109 1 Saltstack 1 Salt 2025-04-20 2.1 LOW 7.8 HIGH
The salt-ssh minion code in SaltStack Salt 2016.11 before 2016.11.4 copied over configuration from the Salt Master without adjusting permissions, which might leak credentials to local attackers on configured minions (clients).
CVE-2017-14696 1 Saltstack 1 Salt 2025-04-20 5.0 MEDIUM 7.5 HIGH
SaltStack Salt before 2016.3.8, 2016.11.x before 2016.11.8, and 2017.7.x before 2017.7.2 allows remote attackers to cause a denial of service via a crafted authentication request.
CVE-2015-4017 1 Saltstack 1 Salt 2025-04-20 5.0 MEDIUM 7.5 HIGH
Salt before 2014.7.6 does not verify certificates when connecting via the aliyun, proxmox, and splunk modules.
CVE-2015-1838 2 Fedoraproject, Saltstack 2 Fedora, Salt 2025-04-20 4.6 MEDIUM 5.3 MEDIUM
modules/serverdensity_device.py in SaltStack before 2014.7.4 does not properly handle files in /tmp.
CVE-2017-12791 1 Saltstack 1 Salt 2025-04-20 7.5 HIGH 9.8 CRITICAL
Directory traversal vulnerability in minion id validation in SaltStack Salt before 2016.11.7 and 2017.7.x before 2017.7.1 allows remote minions with incorrect credentials to authenticate to a master via a crafted minion ID.
CVE-2016-9639 1 Saltstack 1 Salt 2025-04-20 7.5 HIGH 9.1 CRITICAL
Salt before 2015.8.11 allows deleted minions to read or write to minions with the same id, related to caching.
CVE-2015-8034 1 Saltstack 1 Salt 2025-04-20 2.1 LOW 3.3 LOW
The state.sls function in Salt before 2015.8.3 uses weak permissions on the cache data, which allows local users to obtain sensitive information by reading the file.
CVE-2015-6918 1 Saltstack 1 Salt 2015 2025-04-20 3.5 LOW 6.3 MEDIUM
salt before 2015.5.5 leaks git usernames and passwords to the log.
CVE-2017-14695 1 Saltstack 1 Salt 2025-04-20 7.5 HIGH 9.8 CRITICAL
Directory traversal vulnerability in minion id validation in SaltStack Salt before 2016.3.8, 2016.11.x before 2016.11.8, and 2017.7.x before 2017.7.2 allows remote minions with incorrect credentials to authenticate to a master via a crafted minion ID. NOTE: this vulnerability exists because of an incomplete fix for CVE-2017-12791.
CVE-2015-1839 2 Fedoraproject, Saltstack 2 Fedora, Salt 2025-04-20 4.6 MEDIUM 5.3 MEDIUM
modules/chef.py in SaltStack before 2014.7.4 does not properly handle files in /tmp.
CVE-2016-3176 1 Saltstack 1 Salt 2025-04-20 4.3 MEDIUM 5.6 MEDIUM
Salt before 2015.5.10 and 2015.8.x before 2015.8.8, when PAM external authentication is enabled, allows attackers to bypass the configured authentication service by passing an alternate service with a command sent to LocalClient.
CVE-2016-1866 2 Opensuse, Saltstack 2 Leap, Salt 2025-04-12 6.8 MEDIUM 8.1 HIGH
Salt 2015.8.x before 2015.8.4 does not properly handle clear messages on the minion, which allows man-in-the-middle attackers to execute arbitrary code by inserting packets into the minion-master data stream.
CVE-2014-3563 1 Saltstack 1 Salt 2025-04-12 7.2 HIGH N/A
Multiple unspecified vulnerabilities in Salt (aka SaltStack) before 2014.1.10 allow local users to have an unspecified impact via vectors related to temporary file creation in (1) seed.py, (2) salt-ssh, or (3) salt-cloud.
CVE-2013-4435 1 Saltstack 1 Salt 2025-04-11 6.0 MEDIUM N/A
Salt (aka SaltStack) 0.15.0 through 0.17.0 allows remote authenticated users who are using external authentication or client ACL to execute restricted routines by embedding the routine in another routine.
CVE-2013-4436 1 Saltstack 1 Salt 2025-04-11 9.3 HIGH N/A
The default configuration for salt-ssh in Salt (aka SaltStack) 0.17.0 does not validate the SSH host key of requests, which allows remote attackers to have unspecified impact via a man-in-the-middle (MITM) attack.
CVE-2013-6617 1 Saltstack 1 Salt 2025-04-11 10.0 HIGH N/A
The salt master in Salt (aka SaltStack) 0.11.0 through 0.17.0 does not properly drop group privileges, which makes it easier for remote attackers to gain privileges.
CVE-2013-4439 1 Saltstack 1 Salt 2025-04-11 4.9 MEDIUM N/A
Salt (aka SaltStack) before 0.15.0 through 0.17.0 allows remote authenticated minions to impersonate arbitrary minions via a crafted minion with a valid key.