Lucene search

K
osvGoogleOSV:USN-4769-1
HistoryMar 15, 2021 - 8:11 p.m.

salt vulnerabilities

2021-03-1520:11:16
Google
osv.dev
8
salt vulnerabilities
remote file write
sensitive information exposure
authentication bypass
dos
arbitrary code execution
ubuntu 14.04 esm
ubuntu 16.04 esm
cve-2014-3563
cve-2015-6918
cve-2015-6941
cve-2017-12791
cve-2017-14695
cve-2017-14696
cve-2018-15750
cve-2018-15751

AI Score

8.1

Confidence

Low

EPSS

0.034

Percentile

91.4%

It was discovered that Salt allowed remote attackers to write to
arbitrary files via a special crafted file. An attacker could use this
vulnerability to cause a DoS or possibly execute arbitrary code. This
issue only affected Ubuntu 14.04 ESM. (CVE-2014-3563)

Andreas Stieger discovered that Salt exposed git usernames and passwords
in log files. An attacker could use this issue to retrieve sensitive
information. This issue only affected Ubuntu 14.04 ESM. (CVE-2015-6918).

It was discovered that Salt exposed password authentication
credentials in log files. An attacker could use this issue to retrieve
sensitive information. This issue only affected Ubuntu 14.04 ESM.
(CVE-2015-6941)

It was discovered that Salt allowed remote attackers to write to
arbitrary files via a special crafted file. An attacker could use this
issue to cause a DoS or possibly execute arbitrary code. (CVE-2017-12791,
CVE-2017-14695, CVE-2017-14696)

It was discovered that Salt allowed remote attackers to determine which
files exist on the server. An attacker could use this issue to extract
sensitive information. This issue only affected Ubuntu 16.04 ESM.
(CVE-2018-15750)

It was discovered that Salt allowed users to bypass authentication. An
attacker could use this issue to extract sensitive information, execute
arbitrary code or crash the server. This issue only affected Ubuntu 16.04
ESM. (CVE-2018-15751)