CVE-2018-15751: SaltStack Salt Remote command execution and incorrect access control when using salt-api
(updated )
SaltStack Salt 2016.11.x before 2016.11.10, 2017.7.x before 2017.7.8 and 2018.3.x before 2018.3.3 allow remote attackers to bypass authentication and execute arbitrary commands via salt-api(netapi).
References
- docs.saltstack.com/en/2017.7/topics/releases/2017.7.8.html
- docs.saltstack.com/en/latest/topics/releases/2018.3.3.html
- github.com/advisories/GHSA-x549-r7m8-gv63
- github.com/pypa/advisory-database/tree/main/vulns/salt/PYSEC-2018-30.yaml
- github.com/saltstack/salt
- github.com/saltstack/salt/blob/8f9405cf8e6f7d7776d5000841c886dec6d96250/doc/topics/releases/2016.11.10.rst
- github.com/saltstack/salt/blob/8f9405cf8e6f7d7776d5000841c886dec6d96250/doc/topics/releases/2017.7.8.rst
- github.com/saltstack/salt/blob/8f9405cf8e6f7d7776d5000841c886dec6d96250/doc/topics/releases/2018.3.3.rst
- groups.google.com/d/msg/salt-users/L9xqcJ0UXxs/qgDj42obBQAJ
- groups.google.com/d/msg/salt-users/dimVF7rpphY/jn3Xv3MbBQAJ
- lists.debian.org/debian-lts-announce/2020/07/msg00024.html
- nvd.nist.gov/vuln/detail/CVE-2018-15751
- usn.ubuntu.com/4459-1
Detect and mitigate CVE-2018-15751 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →