GHSA-vqh4-crjf-jjxx

Suggest an improvement
Source
https://github.com/advisories/GHSA-vqh4-crjf-jjxx
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-vqh4-crjf-jjxx/GHSA-vqh4-crjf-jjxx.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-vqh4-crjf-jjxx
Aliases
Published
2022-05-14T02:11:54Z
Modified
2024-10-21T22:06:40.552351Z
Severity
  • 8.1 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Salt Improper Access Control
Details

Salt 2015.8.x before 2015.8.4 does not properly handle clear messages on the minion, which allows man-in-the-middle attackers to execute arbitrary code by inserting packets into the minion-master data stream.

Database specific
{
    "nvd_published_at": "2016-04-12T14:59:00Z",
    "cwe_ids": [
        "CWE-284"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2023-07-28T23:19:01Z"
}
References

Affected packages

PyPI / salt

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2015.8.0rc1
Fixed
2015.8.4

Affected versions

2015.*

2015.8.0rc1
2015.8.0rc2
2015.8.0rc3
2015.8.0rc4
2015.8.0rc5
2015.8.0
2015.8.1
2015.8.2
2015.8.3