logo

CVE-2013-4438 salt

Package

Manager: pip
Name: salt
Vulnerable Version: =0.10.0 || =0.10.1 || =0.10.2 || =0.10.3 || =0.10.4 || =0.10.5 || =0.11.0 || =0.11.1 || =0.12.0 || =0.12.1 || =0.13.0 || =0.13.1 || =0.13.2 || =0.13.3 || =0.14.0 || =0.14.1 || =0.15.0 || =0.15.1 || =0.15.2 || =0.15.3 || =0.15.90 || =0.16.0 || =0.16.1 || =0.16.2 || =0.16.3 || =0.16.4 || =0.17.0 || =0.17.0rc1 || =0.8.7 || =0.8.9 || =0.9.0 || =0.9.1 || =0.9.2 || =0.9.3 || =0.9.4 || =0.9.5 || =0.9.6 || =0.9.7 || =0.9.8 || =0.9.9 || =0.9.9.1 || >=0 <0.17.1

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N/E:H/RL:U/RC:C

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.0057 pctl0.67653

Details

Salt (aka SaltStack) before 0.17.1 allows remote attackers to execute arbitrary YAML code via unspecified vectors. NOTE: the vendor states that this might not be a vulnerability because the YAML to be loaded has already been determined to be safe.

Metadata

Created: 2013-11-05T18:55:00Z
Modified: 2023-11-08T03:57:23.214101Z
Source: https://osv-vulnerabilities
CWE IDs: N/A
Alternative ID: N/A
Finding: F422
Auto approve: 1