FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The VUXML data was last processed by FreshPorts on 2024-04-18 11:12:36 UTC

List all Vulnerabilities, by package

List all Vulnerabilities, by date

k68

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
0652005e-ca96-11e5-96d6-14dae9d210b8salt -- code execution

SaltStack reports:

Improper handling of clear messages on the minion, which could result in executing commands not sent by the master.


Discovery 2016-01-25
Entry 2016-02-03
py27-salt
py32-salt
py33-salt
py34-salt
py35-salt
ge 2015.8.0 lt 2015.8.4

https://docs.saltstack.com/en/latest/topics/releases/2015.8.4.html
https://github.com/saltstack/salt/pull/30613/files
CVE-2016-1866
3531141d-a708-477c-954a-2a0549e49ca9salt -- Maliciously crafted minion IDs can cause unwanted directory traversals on the Salt-master

SaltStack reports:

Correct a flaw in minion id validation which could allow certain minions to authenticate to a master despite not having the correct credentials. To exploit the vulnerability, an attacker must create a salt-minion with an ID containing characters that will cause a directory traversal. Credit for discovering the security flaw goes to: Vernhk@qq.com


Discovery 2017-08-16
Entry 2017-08-22
py27-salt
py32-salt
py33-salt
py34-salt
py35-salt
py36-salt
< 2016.11.7

ge 2017.7.0 lt 2017.7.1

CVE-2017-12791
https://docs.saltstack.com/en/latest/topics/releases/2017.7.1.html
https://docs.saltstack.com/en/latest/topics/releases/2016.11.7.html
4f7c6af3-6a2c-4ead-8453-04e509688d45salt -- multiple vulnerabilities

SaltStack reports:

Remote command execution and incorrect access control when using salt-api.

Directory traversal vulnerability when using salt-api. Allows an attacker to determine what files exist on a server when querying /run or /events.


Discovery 2018-10-24
Entry 2018-10-27
py27-salt
py32-salt
py33-salt
py34-salt
py35-salt
py36-salt
py37-salt
< 2017.7.8

ge 2018.3.0 lt 2018.3.3

CVE-2018-15751
CVE-2018-15750
https://docs.saltstack.com/en/latest/topics/releases/2018.3.3.html
https://docs.saltstack.com/en/2017.7/topics/releases/2017.7.8.html
50127e44-7b88-4ade-8e12-5d57320823f1salt -- multiple vulnerabilities

SaltStack reports:

Directory traversal vulnerability in minion id validation in SaltStack. Allows remote minions with incorrect credentials to authenticate to a master via a crafted minion ID. Credit for discovering the security flaw goes to: Julian Brost (julian@0x4a42.net). NOTE: this vulnerability exists because of an incomplete fix for CVE-2017-12791.

Remote Denial of Service with a specially crafted authentication request. Credit for discovering the security flaw goes to: Julian Brost (julian@0x4a42.net)


Discovery 2017-10-09
Entry 2017-11-23
py27-salt
py32-salt
py33-salt
py34-salt
py35-salt
py36-salt
< 2016.11.8

ge 2017.7.0 lt 2017.7.2

CVE-2017-14695
CVE-2017-14696
https://docs.saltstack.com/en/latest/topics/releases/2017.7.2.html
https://docs.saltstack.com/en/2016.11/topics/releases/2016.11.8.html
https://github.com/saltstack/salt/commit/80d90307b07b3703428ecbb7c8bb468e28a9ae6d
https://github.com/saltstack/salt/commit/5f8b5e1a0f23fe0f2be5b3c3e04199b57a53db5b
6bf55af9-973b-11ea-9f2c-38d547003487salt -- multiple vulnerabilities in salt-master process

F-Secure reports:

CVE-2020-11651 - Authentication bypass vulnerabilities

The ClearFuncs class processes unauthenticated requests and unintentionally exposes the _send_pub() method, which can be used to queue messages directly on the master publish server. Such messages can be used to trigger minions to run arbitrary commands as root.

The ClearFuncs class also exposes the method _prep_auth_info(), which returns the "root key" used to authenticate commands from the local root user on the master server. This "root key" can then be used to remotely call administrative commands on the master server. This unintentional exposure provides a remote un-authenticated attacker with root-equivalent access to the salt master.

CVE-2020-11652 - Directory traversal vulnerabilities

The wheel module contains commands used to read and write files under specific directory paths. The inputs to these functions are concatenated with the target directory and the resulting path is not canonicalized, leading to an escape of the intended path restriction.

The get_token() method of the salt.tokens.localfs class (which is exposed to unauthenticated requests by the ClearFuncs class) fails to sanitize the token input parameter which is then used as a filename, allowing insertion of ".." path elements and thus reading of files outside of the intended directory. The only restriction is that the file has to be deserializable by salt.payload.Serial.loads().


Discovery 2020-04-30
Entry 2020-05-16
py27-salt
py32-salt
py33-salt
py34-salt
py35-salt
py36-salt
py37-salt
py38-salt
< 2019.2.4

ge 3000 lt 3000.2

CVE-2020-11651
CVE-2020-11652
https://nvd.nist.gov/vuln/detail/CVE-2020-11651
https://nvd.nist.gov/vuln/detail/CVE-2020-11652
https://docs.saltstack.com/en/latest/topics/releases/2019.2.4.html
https://labs.f-secure.com/advisories/saltstack-authorization-bypass
https://blog.f-secure.com/new-vulnerabilities-make-exposed-salt-hosts-easy-targets/
https://www.tenable.com/blog/cve-2020-11651-cve-2020-11652-critical-salt-framework-vulnerabilities-exploited-in-the-wild
6d25c306-f3bb-11e5-92ce-002590263bf5salt -- Insecure configuration of PAM external authentication service

SaltStack reports:

This issue affects all Salt versions prior to 2015.8.8/2015.5.10 when PAM external authentication is enabled. This issue involves passing an alternative PAM authentication service with a command that is sent to LocalClient, enabling the attacker to bypass the configured authentication service.


Discovery 2016-03-17
Entry 2016-03-27
py27-salt
py32-salt
py33-salt
py34-salt
py35-salt
< 2015.5.10

ge 2015.8.0 lt 2015.8.8

CVE-2016-3176
https://docs.saltstack.com/en/latest/topics/releases/2015.8.8.html
8c98e643-6008-11ea-af63-38d547003487salt -- salt-api vulnerability

SaltStack reports:

With the Salt NetAPI enabled in addition to having a SSH roster defined, unauthenticated access is possible when specifying the client as SSH.

Additionally, when the raw_shell option is specified any arbitrary command may be run on the Salt master when specifying SSH options.


Discovery 2020-01-15
Entry 2020-03-07
py27-salt
py32-salt
py33-salt
py34-salt
py35-salt
py36-salt
py37-salt
py38-salt
< 2019.2.3

CVE-2019-17361
https://docs.saltstack.com/en/latest/topics/releases/2019.2.3.html
https://nvd.nist.gov/vuln/detail/CVE-2019-17361