CVE-2018-15750: SaltStack Salt Directory Traversal vulnerability in salt-api
(updated )
Directory Traversal vulnerability in salt-api in SaltStack Salt 2016.11.x before 2016.11.10, 2017.7.x before 2017.7.8 and 2018.3.x before 2018.3.3 allows remote attackers to determine which files exist on the server.
References
- docs.saltstack.com/en/2017.7/topics/releases/2017.7.8.html
- docs.saltstack.com/en/latest/topics/releases/2018.3.3.html
- github.com/advisories/GHSA-jx34-pppm-gjvr
- github.com/pypa/advisory-database/tree/main/vulns/salt/PYSEC-2018-29.yaml
- github.com/saltstack/salt
- github.com/saltstack/salt/blob/8f9405cf8e6f7d7776d5000841c886dec6d96250/doc/topics/releases/2016.11.10.rst
- github.com/saltstack/salt/blob/8f9405cf8e6f7d7776d5000841c886dec6d96250/doc/topics/releases/2017.7.8.rst
- github.com/saltstack/salt/blob/8f9405cf8e6f7d7776d5000841c886dec6d96250/doc/topics/releases/2018.3.3.rst
- groups.google.com/d/msg/salt-users/L9xqcJ0UXxs/qgDj42obBQAJ
- groups.google.com/d/msg/salt-users/dimVF7rpphY/jn3Xv3MbBQAJ
- lists.debian.org/debian-lts-announce/2020/07/msg00024.html
- nvd.nist.gov/vuln/detail/CVE-2018-15750
- usn.ubuntu.com/4459-1
Detect and mitigate CVE-2018-15750 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →