logo

CVE-2019-1010259 salt

Package

Manager: pip
Name: salt
Vulnerable Version: >=2018.3.0 <2018.3.4

Severity

Level: Critical

CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.0037 pctl0.58034

Details

SaltStack Salt SQL Injection vulnerability in mysql.user_chpass function SaltStack Salt 2018.3 is affected by: SQL Injection. The impact is: An attacker could escalate privileges on MySQL server deployed by cloud provider. It leads to RCE. The component is: The `mysql.user_chpass` function from the MySQL module for Salt (https://github.com/saltstack/salt/blob/develop/salt/modules/mysql.py#L1462). The attack vector is: specially crafted password string. The fixed version is: 2018.3.4.

Metadata

Created: 2022-05-24T16:50:39Z
Modified: 2024-10-25T20:20:14Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-h8xp-h3jf-wv4v/GHSA-h8xp-h3jf-wv4v.json
CWE IDs: ["CWE-89"]
Alternative ID: GHSA-h8xp-h3jf-wv4v
Finding: F297
Auto approve: 1