CVE-2021-3144 – salt
Package
Manager: pip
Name: salt
Vulnerable Version: >=0 <2015.8.13 || >=2016.3.0 <2016.11.5 || >=2016.11.7 <2016.11.10 || >=2017.5.0 <2017.7.8 || >=2018.2.0 <=2018.3.5 || >=3000 <3000.7 || >=3001 <3001.5 || >=3002 <3002.3 || >=2019.2.0 <2019.2.8
Severity
Level: Critical
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
EPSS: 0.04713 pctl0.8896
Details
SaltStack Salt eauth tokens can be used once after expiration In SaltStack Salt before 3002.5, eauth tokens can be used once after expiration. (They might be used to run command against the salt master or minions.)
Metadata
Created: 2022-05-24T17:43:23Z
Modified: 2024-10-23T18:26:56Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-w2hr-3mc8-46gh/GHSA-w2hr-3mc8-46gh.json
CWE IDs: ["CWE-613"]
Alternative ID: GHSA-w2hr-3mc8-46gh
Finding: F076
Auto approve: 1