Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. salt
  4. ›
  5. CVE-2019-1010259

CVE-2019-1010259: SaltStack Salt SQL Injection vulnerability in mysql.user_chpass function

May 24, 2022 (updated October 25, 2024)

SaltStack Salt 2018.3 is affected by: SQL Injection. The impact is: An attacker could escalate privileges on MySQL server deployed by cloud provider. It leads to RCE. The component is: The mysql.user_chpass function from the MySQL module for Salt (https://github.com/saltstack/salt/blob/develop/salt/modules/mysql.py#L1462). The attack vector is: specially crafted password string. The fixed version is: 2018.3.4.

References

  • github.com/ShantonRU/salt/commit/a46c86a987c78e74e87969d8d3b27094e6544b7a
  • github.com/advisories/GHSA-h8xp-h3jf-wv4v
  • github.com/pypa/advisory-database/tree/main/vulns/salt/PYSEC-2019-119.yaml
  • github.com/saltstack/salt
  • github.com/saltstack/salt/blob/f22de0887cd7167887f113bf394244b74fb36b6b/salt/modules/mysql.py
  • github.com/saltstack/salt/pull/51462
  • nvd.nist.gov/vuln/detail/CVE-2019-1010259

Code Behaviors & Features

Detect and mitigate CVE-2019-1010259 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 2018.3.0 before 2018.3.4

Fixed versions

  • 2018.3.4

Solution

Upgrade to version 2018.3.4 or above.

Impact 9.8 CRITICAL

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Source file

pypi/salt/CVE-2019-1010259.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:03 +0000.