Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-3148 (GCVE-0-2021-3148)
Vulnerability from cvelistv5 – Published: 2021-02-27 00:00 – Updated: 2024-08-03 16:45- n/a
| URL | Tags | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T16:45:51.371Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://github.com/saltstack/salt/releases"
},
{
"tags": [
"x_transferred"
],
"url": "https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/"
},
{
"name": "FEDORA-2021-904a2dbc0c",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YOGNT2XWPOYV7YT75DN7PS4GIYWFKOK5/"
},
{
"name": "FEDORA-2021-5756fbf8a6",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7GRVZ5WAEI3XFN2BDTL6DDXFS5HYSDVB/"
},
{
"name": "FEDORA-2021-43eb5584ad",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FUGLOJ6NXLCIFRD2JTXBYQEMAEF2B6XH/"
},
{
"name": "GLSA-202103-01",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/202103-01"
},
{
"name": "[debian-lts-announce] 20211110 [SECURITY] [DLA 2815-1] salt security update",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00009.html"
},
{
"name": "DSA-5011",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.debian.org/security/2021/dsa-5011"
},
{
"name": "GLSA-202310-22",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/202310-22"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in SaltStack Salt before 3002.5. Sending crafted web requests to the Salt API can result in salt.utils.thin.gen_thin() command injection because of different handling of single versus double quotes. This is related to salt/utils/thin.py."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-10-31T13:06:30.448Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://github.com/saltstack/salt/releases"
},
{
"url": "https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/"
},
{
"name": "FEDORA-2021-904a2dbc0c",
"tags": [
"vendor-advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YOGNT2XWPOYV7YT75DN7PS4GIYWFKOK5/"
},
{
"name": "FEDORA-2021-5756fbf8a6",
"tags": [
"vendor-advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7GRVZ5WAEI3XFN2BDTL6DDXFS5HYSDVB/"
},
{
"name": "FEDORA-2021-43eb5584ad",
"tags": [
"vendor-advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FUGLOJ6NXLCIFRD2JTXBYQEMAEF2B6XH/"
},
{
"name": "GLSA-202103-01",
"tags": [
"vendor-advisory"
],
"url": "https://security.gentoo.org/glsa/202103-01"
},
{
"name": "[debian-lts-announce] 20211110 [SECURITY] [DLA 2815-1] salt security update",
"tags": [
"mailing-list"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00009.html"
},
{
"name": "DSA-5011",
"tags": [
"vendor-advisory"
],
"url": "https://www.debian.org/security/2021/dsa-5011"
},
{
"name": "GLSA-202310-22",
"tags": [
"vendor-advisory"
],
"url": "https://security.gentoo.org/glsa/202310-22"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2021-3148",
"datePublished": "2021-02-27T00:00:00.000Z",
"dateReserved": "2021-01-14T00:00:00.000Z",
"dateUpdated": "2024-08-03T16:45:51.371Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
FKIE_CVE-2021-3148
Vulnerability from fkie_nvd - Published: 2021-02-27 05:15 - Updated: 2024-11-21 06:20| Vendor | Product | Version | |
|---|---|---|---|
| saltstack | salt | * | |
| saltstack | salt | * | |
| saltstack | salt | * | |
| saltstack | salt | * | |
| saltstack | salt | * | |
| saltstack | salt | * | |
| saltstack | salt | * | |
| saltstack | salt | * | |
| saltstack | salt | * | |
| saltstack | salt | * | |
| saltstack | salt | * | |
| saltstack | salt | * | |
| saltstack | salt | * | |
| saltstack | salt | * | |
| saltstack | salt | * | |
| fedoraproject | fedora | 32 | |
| fedoraproject | fedora | 33 | |
| fedoraproject | fedora | 34 | |
| debian | debian_linux | 9.0 | |
| debian | debian_linux | 10.0 | |
| debian | debian_linux | 11.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0F9405E3-F2B0-41BA-A39D-61BB38475A59",
"versionEndExcluding": "2015.8.10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A35C23D3-82D4-46E7-BF08-9229C04C0C3D",
"versionEndExcluding": "2015.8.13",
"versionStartIncluding": "2015.8.11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B4741BD5-4C40-48BC-A2C1-E6AB33818201",
"versionEndExcluding": "2016.3.4",
"versionStartIncluding": "2016.3.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7D28A2B5-316A-45DC-AC85-A0F743C4B3C4",
"versionEndExcluding": "2016.3.6",
"versionStartIncluding": "2016.3.5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*",
"matchCriteriaId": "17C96153-85C1-45DC-A48B-46A3900246E2",
"versionEndExcluding": "2016.3.8",
"versionStartIncluding": "2016.3.7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*",
"matchCriteriaId": "67FBC561-336A-4F25-B347-C4CA029B6E30",
"versionEndExcluding": "2016.11.3",
"versionStartIncluding": "2016.3.9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A5E17739-655C-4FAC-A73B-985132B32C73",
"versionEndExcluding": "2016.11.5",
"versionStartIncluding": "2016.11.4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*",
"matchCriteriaId": "11D84847-0C8A-473A-9186-46FABD7BB59A",
"versionEndExcluding": "2016.11.10",
"versionStartIncluding": "2016.11.7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3721B047-2595-4E79-8FDD-B1224FC0DD2C",
"versionEndExcluding": "2017.7.8",
"versionStartIncluding": "2017.5.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EB8FA088-6AAD-46DF-884C-7362CB4BE430",
"versionEndIncluding": "2018.3.5",
"versionStartIncluding": "2018.2.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F7A2912C-7F48-465D-B7F2-93ECD0D0CB74",
"versionEndExcluding": "2019.2.5",
"versionStartIncluding": "2019.2.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*",
"matchCriteriaId": "40369149-A5C3-4759-844F-3510559397C5",
"versionEndExcluding": "2019.2.8",
"versionStartIncluding": "2019.2.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*",
"matchCriteriaId": "906D2835-186A-455E-84EB-E982564B9CBD",
"versionEndExcluding": "3000.6",
"versionStartIncluding": "3000",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5F0E0DA3-49F7-4938-9FBD-F3680B1BDBB6",
"versionEndExcluding": "3001.4",
"versionStartIncluding": "3001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6B757DF0-6490-4FE7-9C98-5D8C700A4377",
"versionEndExcluding": "3002.5",
"versionStartIncluding": "3002",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in SaltStack Salt before 3002.5. Sending crafted web requests to the Salt API can result in salt.utils.thin.gen_thin() command injection because of different handling of single versus double quotes. This is related to salt/utils/thin.py."
},
{
"lang": "es",
"value": "Se detect\u00f3 un problema en SaltStack Salt versiones anteriores a 3002.5.\u0026#xa0;El env\u00edo de peticiones web dise\u00f1adas a la API de Salt puede resultar en una inyecci\u00f3n del comando de la funci\u00f3n salt.utils.thin.gen_thin() debido al manejo diferente de las comillas simples y las dobles.\u0026#xa0;Esto est\u00e1 relacionado con el archivo salt/utils/thin.py"
}
],
"id": "CVE-2021-3148",
"lastModified": "2024-11-21T06:20:59.690",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-02-27T05:15:14.190",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/saltstack/salt/releases"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00009.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7GRVZ5WAEI3XFN2BDTL6DDXFS5HYSDVB/"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FUGLOJ6NXLCIFRD2JTXBYQEMAEF2B6XH/"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YOGNT2XWPOYV7YT75DN7PS4GIYWFKOK5/"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202103-01"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202310-22"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2021/dsa-5011"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/saltstack/salt/releases"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00009.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7GRVZ5WAEI3XFN2BDTL6DDXFS5HYSDVB/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FUGLOJ6NXLCIFRD2JTXBYQEMAEF2B6XH/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YOGNT2XWPOYV7YT75DN7PS4GIYWFKOK5/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202103-01"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202310-22"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2021/dsa-5011"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-77"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CERTFR-2021-AVI-154
Vulnerability from certfr_avis - Published: 2021-03-02 - Updated: 2021-03-02
De multiples vulnérabilités ont été découvertes dans SaltStack. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un contournement de la politique de sécurité et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Salt versions ant\u00e9rieures \u00e0 3002.5, 3001.6 ou 3000.8",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-25283",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25283"
},
{
"name": "CVE-2021-25281",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25281"
},
{
"name": "CVE-2020-35662",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35662"
},
{
"name": "CVE-2021-25284",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25284"
},
{
"name": "CVE-2021-3144",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3144"
},
{
"name": "CVE-2020-28243",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28243"
},
{
"name": "CVE-2020-28972",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28972"
},
{
"name": "CVE-2021-3197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3197"
},
{
"name": "CVE-2021-3148",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3148"
},
{
"name": "CVE-2021-25282",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25282"
}
],
"initial_release_date": "2021-03-02T00:00:00",
"last_revision_date": "2021-03-02T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-154",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-03-02T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans SaltStack.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un contournement de la\npolitique de s\u00e9curit\u00e9 et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans SaltStack",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SaltStack du 25 f\u00e9vrier 2021",
"url": "https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/"
}
]
}
GHSA-GHC2-HX3W-JQMP
Vulnerability from github – Published: 2022-05-24 17:43 – Updated: 2024-10-23 18:27An issue was discovered in SaltStack Salt before 3002.5. Sending crafted web requests to the Salt API can result in salt.utils.thin.gen_thin() command injection because of different handling of single versus double quotes. This is related to salt/utils/thin.py.
{
"affected": [
{
"package": {
"ecosystem": "PyPI",
"name": "salt"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2015.8.13"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "PyPI",
"name": "salt"
},
"ranges": [
{
"events": [
{
"introduced": "2016.3.0"
},
{
"fixed": "2016.11.5"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "PyPI",
"name": "salt"
},
"ranges": [
{
"events": [
{
"introduced": "2016.11.7"
},
{
"fixed": "2016.11.10"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "PyPI",
"name": "salt"
},
"ranges": [
{
"events": [
{
"introduced": "2017.5.0"
},
{
"fixed": "2017.7.8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "PyPI",
"name": "salt"
},
"ranges": [
{
"events": [
{
"introduced": "2018.2.0"
},
{
"last_affected": "2018.3.5"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "PyPI",
"name": "salt"
},
"ranges": [
{
"events": [
{
"introduced": "2019.2.0"
},
{
"fixed": "2019.2.8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "PyPI",
"name": "salt"
},
"ranges": [
{
"events": [
{
"introduced": "3000"
},
{
"fixed": "3000.7"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "PyPI",
"name": "salt"
},
"ranges": [
{
"events": [
{
"introduced": "3001"
},
{
"fixed": "3001.5"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "PyPI",
"name": "salt"
},
"ranges": [
{
"events": [
{
"introduced": "3002"
},
{
"fixed": "3002.3"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2021-3148"
],
"database_specific": {
"cwe_ids": [
"CWE-77"
],
"github_reviewed": true,
"github_reviewed_at": "2024-04-22T21:16:52Z",
"nvd_published_at": "2021-02-27T05:15:00Z",
"severity": "CRITICAL"
},
"details": "An issue was discovered in SaltStack Salt before 3002.5. Sending crafted web requests to the Salt API can result in `salt.utils.thin.gen_thin()` command injection because of different handling of single versus double quotes. This is related to `salt/utils/thin.py`.",
"id": "GHSA-ghc2-hx3w-jqmp",
"modified": "2024-10-23T18:27:41Z",
"published": "2022-05-24T17:43:23Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3148"
},
{
"type": "WEB",
"url": "https://www.debian.org/security/2021/dsa-5011"
},
{
"type": "WEB",
"url": "https://security.gentoo.org/glsa/202310-22"
},
{
"type": "WEB",
"url": "https://security.gentoo.org/glsa/202103-01"
},
{
"type": "WEB",
"url": "https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YOGNT2XWPOYV7YT75DN7PS4GIYWFKOK5"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FUGLOJ6NXLCIFRD2JTXBYQEMAEF2B6XH"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7GRVZ5WAEI3XFN2BDTL6DDXFS5HYSDVB"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YOGNT2XWPOYV7YT75DN7PS4GIYWFKOK5"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FUGLOJ6NXLCIFRD2JTXBYQEMAEF2B6XH"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7GRVZ5WAEI3XFN2BDTL6DDXFS5HYSDVB"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00009.html"
},
{
"type": "WEB",
"url": "https://github.com/saltstack/salt/releases"
},
{
"type": "WEB",
"url": "https://github.com/saltstack/salt/blob/8f9405cf8e6f7d7776d5000841c886dec6d96250/doc/topics/releases/3002.3.rst#L23"
},
{
"type": "WEB",
"url": "https://github.com/saltstack/salt/blob/8f9405cf8e6f7d7776d5000841c886dec6d96250/doc/topics/releases/3001.5.rst#L23"
},
{
"type": "WEB",
"url": "https://github.com/saltstack/salt/blob/8f9405cf8e6f7d7776d5000841c886dec6d96250/doc/topics/releases/3000.7.rst#L23"
},
{
"type": "WEB",
"url": "https://github.com/saltstack/salt/blob/8f9405cf8e6f7d7776d5000841c886dec6d96250/CHANGELOG.md?plain=1#L2374"
},
{
"type": "PACKAGE",
"url": "https://github.com/saltstack/salt"
},
{
"type": "WEB",
"url": "https://github.com/pypa/advisory-database/tree/main/vulns/salt/PYSEC-2021-55.yaml"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "SaltStack Salt command injection in the Salt-API when using the Salt-SSH client"
}
PYSEC-2021-55
Vulnerability from pysec - Published: 2021-02-27 05:15 - Updated: 2021-03-31 14:15An issue was discovered in SaltStack Salt before 3002.5. Sending crafted web requests to the Salt API can result in salt.utils.thin.gen_thin() command injection because of different handling of single versus double quotes. This is related to salt/utils/thin.py.
| Name | purl | salt | pkg:pypi/salt |
|---|
{
"affected": [
{
"package": {
"ecosystem": "PyPI",
"name": "salt",
"purl": "pkg:pypi/salt"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2015.8.10"
},
{
"introduced": "2015.8.11"
},
{
"fixed": "2015.8.13"
},
{
"introduced": "2016.3.0"
},
{
"fixed": "2016.3.4"
},
{
"introduced": "2016.3.5"
},
{
"fixed": "2016.3.6"
},
{
"introduced": "2016.3.7"
},
{
"fixed": "2016.3.8"
},
{
"introduced": "2016.11.0"
},
{
"fixed": "2016.11.3"
},
{
"introduced": "2016.11.4"
},
{
"fixed": "2016.11.5"
},
{
"introduced": "2016.11.7"
},
{
"fixed": "2016.11.10"
},
{
"introduced": "2017.7.0"
},
{
"fixed": "2017.7.8"
},
{
"introduced": "2018.3.0rc1"
},
{
"fixed": "2019.2.0rc1"
},
{
"introduced": "2019.2.0"
},
{
"fixed": "2019.2.5"
},
{
"introduced": "2019.2.6"
},
{
"fixed": "2019.2.8"
},
{
"introduced": "3000"
},
{
"fixed": "3000.6"
},
{
"introduced": "3001"
},
{
"fixed": "3001.4"
},
{
"introduced": "3002"
},
{
"fixed": "3002.5"
}
],
"type": "ECOSYSTEM"
}
],
"versions": [
"0.8.7",
"0.8.9",
"0.9.0",
"0.9.1",
"0.9.2",
"0.9.3",
"0.9.4",
"0.9.5",
"0.9.6",
"0.9.7",
"0.9.8",
"0.9.9",
"0.9.9.1",
"0.10.0",
"0.10.1",
"0.10.2",
"0.10.3",
"0.10.4",
"0.10.5",
"0.11.0",
"0.11.1",
"0.12.0",
"0.12.1",
"0.13.0",
"0.13.1",
"0.13.2",
"0.13.3",
"0.14.0",
"0.14.1",
"0.15.0",
"0.15.1",
"0.15.2",
"0.15.3",
"0.15.90",
"0.16.0",
"0.16.1",
"0.16.2",
"0.16.3",
"0.16.4",
"0.17.0rc1",
"0.17.0",
"0.17.1",
"0.17.2",
"0.17.3",
"0.17.4",
"0.17.5",
"2014.1.0rc1",
"2014.1.0rc2",
"2014.1.0rc3",
"2014.1.0",
"2014.1.1",
"2014.1.2",
"2014.1.3",
"2014.1.4",
"2014.1.5",
"2014.1.6",
"2014.1.7",
"2014.1.8",
"2014.1.9",
"2014.1.10",
"2014.1.11",
"2014.1.12",
"2014.1.13",
"2014.7.0rc1",
"2014.7.0rc2",
"2014.7.0rc3",
"2014.7.0rc4",
"2014.7.0rc5",
"2014.7.0rc6",
"2014.7.0rc7",
"2014.7.0",
"2014.7.1",
"2014.7.2",
"2014.7.3",
"2014.7.4",
"2014.7.5",
"2014.7.6",
"2014.7.7",
"2015.2.0rc1",
"2015.2.0rc2",
"2015.5.0",
"2015.5.1",
"2015.5.2",
"2015.5.3",
"2015.5.4",
"2015.5.5",
"2015.5.6",
"2015.5.7",
"2015.5.8",
"2015.5.9",
"2015.5.10",
"2015.5.11",
"2015.8.0rc1",
"2015.8.0rc2",
"2015.8.0rc3",
"2015.8.0rc4",
"2015.8.0rc5",
"2015.8.0",
"2015.8.1",
"2015.8.2",
"2015.8.3",
"2015.8.4",
"2015.8.5",
"2015.8.7",
"2015.8.8",
"2015.8.8.2",
"2015.8.9",
"2015.8.11",
"2015.8.12",
"2016.3.0",
"2016.3.1",
"2016.3.2",
"2016.3.3",
"2016.3.5",
"2016.3.7",
"2016.11.0",
"2016.11.1",
"2016.11.2",
"2016.11.4",
"2016.11.7",
"2016.11.8",
"2016.11.9",
"2017.7.0",
"2017.7.1",
"2017.7.2",
"2017.7.3",
"2017.7.4",
"2017.7.5",
"2017.7.6",
"2017.7.7",
"2018.3.0rc1",
"2018.3.0",
"2018.3.1",
"2018.3.2",
"2018.3.3",
"2018.3.4",
"2018.3.5",
"2019.2.0",
"2019.2.1",
"2019.2.2",
"2019.2.3",
"2019.2.4",
"2019.2.6",
"2019.2.7",
"3000",
"3000.1",
"3000.2",
"3000.3",
"3000.4",
"3000.5",
"3001",
"3001.1",
"3001.2",
"3001.3",
"3002",
"3002.1",
"3002.2",
"3002.3",
"3002.4"
]
}
],
"aliases": [
"CVE-2021-3148"
],
"details": "An issue was discovered in SaltStack Salt before 3002.5. Sending crafted web requests to the Salt API can result in salt.utils.thin.gen_thin() command injection because of different handling of single versus double quotes. This is related to salt/utils/thin.py.",
"id": "PYSEC-2021-55",
"modified": "2021-03-31T14:15:00Z",
"published": "2021-02-27T05:15:00Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/saltstack/salt/releases"
},
{
"type": "WEB",
"url": "https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YOGNT2XWPOYV7YT75DN7PS4GIYWFKOK5/"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7GRVZ5WAEI3XFN2BDTL6DDXFS5HYSDVB/"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FUGLOJ6NXLCIFRD2JTXBYQEMAEF2B6XH/"
},
{
"type": "ADVISORY",
"url": "https://security.gentoo.org/glsa/202103-01"
}
]
}
CVE-2021-3148
Vulnerability from fstec - Published: 27.02.2021{
"CVSS 2.0": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS 3.0": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f, Fedora Project, SaltStack, Inc, \u0410\u041e \u00ab\u0418\u0412\u041a\u00bb, \u0410\u041e \"\u041d\u041f\u041f\u041a\u0422\"",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "9 (Debian GNU/Linux), 10 (Debian GNU/Linux), 32 (Fedora), 33 (Fedora), 34 (Fedora), 11 (Debian GNU/Linux), \u0434\u043e 2015.8.10 (Salt), \u043e\u0442 2015.8.11 \u0434\u043e 2015.8.13 (Salt), \u043e\u0442 2016.3.5 \u0434\u043e 2016.3.6 (Salt), \u043e\u0442 2016.3.7 \u0434\u043e 2016.3.8 (Salt), \u043e\u0442 2016.3.9 \u0434\u043e 2016.11.3 (Salt), \u043e\u0442 2016.11.4 \u0434\u043e 2016.11.5 (Salt), \u043e\u0442 2016.11.7 \u0434\u043e 2016.11.10 (Salt), \u043e\u0442 2017.5.0 \u0434\u043e 2017.7.8 (Salt), \u043e\u0442 2019.2.0 \u0434\u043e 2019.2.5 (Salt), \u043e\u0442 2019.2.6 \u0434\u043e 2019.2.8 (Salt), \u043e\u0442 3000 \u0434\u043e 3000.6 (Salt), \u043e\u0442 3001 \u0434\u043e 3001.4 (Salt), \u043e\u0442 3002 \u0434\u043e 3002.5 (Salt), \u043e\u0442 2016.3.0 \u0434\u043e 2016.3.4 (Salt), \u043e\u0442 2018.2.0 \u0434\u043e 2018.3.5 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Salt), - (\u0410\u043b\u044c\u0442 8 \u0421\u041f), \u0434\u043e 2.5 (\u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\u0414\u043b\u044f SaltStack Salt:\nhttps://github.com/saltstack/salt/releases\n\n\u0414\u043b\u044f Fedora:\nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7GRVZ5WAEI3XFN2BDTL6DDXFS5HYSDVB/\nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FUGLOJ6NXLCIFRD2JTXBYQEMAEF2B6XH/\nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YOGNT2XWPOYV7YT75DN7PS4GIYWFKOK5/\n\n\u0414\u043b\u044f Debian GNU/Linux:\nhttps://www.debian.org/security/2021/dsa-5011\nhttps://lists.debian.org/debian-lts-announce/2021/11/msg00009.html\n\n\u0414\u043b\u044f \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx:\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f salt \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 2018.3.4+dfsg1-6+deb10u3\n\n\u0414\u043b\u044f \u041e\u0421 \u0410\u043b\u044c\u0442 8 \u0421\u041f: \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0438\u0437 \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e\u0433\u043e \u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0438\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "27.02.2021",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "16.09.2024",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "24.12.2021",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2021-06340",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2021-3148",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Debian GNU/Linux, Fedora, Salt, \u0410\u043b\u044c\u0442 8 \u0421\u041f (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21164305), \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21165913)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 9 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 10 , Fedora Project Fedora 32 , Fedora Project Fedora 33 , Fedora Project Fedora 34 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 11 , \u0410\u041e \u00ab\u0418\u0412\u041a\u00bb \u0410\u043b\u044c\u0442 8 \u0421\u041f - (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21164305), \u0410\u041e \"\u041d\u041f\u041f\u041a\u0422\" \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx \u0434\u043e 2.5 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21165913)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 salt.utils.thin.gen_thin() \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u044f\u043c\u0438 \u0438 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e\u0433\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0439 SaltStack Salt, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0435 \u043a\u043e\u043c\u0430\u043d\u0434\u044b \u0432 \u0446\u0435\u043b\u0435\u0432\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u0435",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u043f\u0440\u0438\u043d\u044f\u0442\u0438\u0435 \u043c\u0435\u0440 \u043f\u043e \u0447\u0438\u0441\u0442\u043a\u0435 \u0434\u0430\u043d\u043d\u044b\u0445 \u043d\u0430 \u0443\u043f\u0440\u0430\u0432\u043b\u044f\u044e\u0449\u0435\u043c \u0443\u0440\u043e\u0432\u043d\u0435 (\u0412\u043d\u0435\u0434\u0440\u0435\u043d\u0438\u0435 \u0432 \u043a\u043e\u043c\u0430\u043d\u0434\u0443) (CWE-77)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 salt.utils.thin.gen_thin() \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u044f\u043c\u0438 \u0438 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e\u0433\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0439 SaltStack Salt \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e\u0439 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u043e\u0439 \u0430\u0440\u0433\u0443\u043c\u0435\u043d\u0442\u043e\u0432, \u043f\u0435\u0440\u0435\u0434\u0430\u0432\u0430\u0435\u043c\u044b\u0445 \u0432 \u043a\u043e\u043c\u0430\u043d\u0434\u0443. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0435 \u043a\u043e\u043c\u0430\u043d\u0434\u044b \u0432 \u0446\u0435\u043b\u0435\u0432\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u0435",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u0418\u043d\u044a\u0435\u043a\u0446\u0438\u044f",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://nvd.nist.gov/vuln/detail/CVE-2021-3148\nhttps://www.suse.com/security/cve/CVE-2021-3148.html\nhttps://www.cybersecurity-help.cz/vdb/SB2021112302\nhttps://github.com/saltstack/salt/releases\nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7GRVZ5WAEI3XFN2BDTL6DDXFS5HYSDVB/\nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FUGLOJ6NXLCIFRD2JTXBYQEMAEF2B6XH/\nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YOGNT2XWPOYV7YT75DN7PS4GIYWFKOK5/\nhttps://www.debian.org/security/2021/dsa-5011\nhttps://lists.debian.org/debian-lts-announce/2021/11/msg00009.html\nhttps://\u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0430.\u043d\u043f\u043f\u043a\u0442.\u0440\u0444/bin/view/\u041e\u0421\u043d\u043e\u0432\u0430/\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f/2.5/\nhttps://altsp.su/obnovleniya-bezopasnosti/",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-77",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,5)\n\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 9,8)"
}
CNVD-2021-15055
Vulnerability from cnvd - Published: 2021-03-08目前厂商已发布升级补丁以修复漏洞,补丁获取链接: https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/
| Name | SaltStack SaltStack Salt <3002.5 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2021-3148",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2021-3148"
}
},
"description": "SaltStack Salt\u662f\u4e00\u79cd\u5168\u65b0\u7684\u57fa\u7840\u8bbe\u65bd\u7ba1\u7406\u65b9\u5f0f\uff0c\u90e8\u7f72\u8f7b\u677e\uff0c\u5728\u51e0\u5206\u949f\u5185\u53ef\u8fd0\u884c\u8d77\u6765\uff0c\u6269\u5c55\u6027\u597d\uff0c\u5f88\u5bb9\u6613\u7ba1\u7406\u4e0a\u4e07\u53f0\u670d\u52a1\u5668\uff0c\u901f\u5ea6\u591f\u5feb\uff0c\u670d\u52a1\u5668\u4e4b\u95f4\u79d2\u7ea7\u901a\u8baf\u3002\n\nSaltStack Salt 3002.5\u4e4b\u524d\u7248\u672c\u5b58\u5728\u547d\u4ee4\u6ce8\u5165\u6f0f\u6d1e\u3002\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u5bf9\u5355\u5f15\u53f7\u548c\u53cc\u5f15\u53f7\u7684\u5904\u7406\u4e0d\u540c\u3002\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u5c06\u7279\u5236Web\u8bf7\u6c42\u53d1\u9001\u5230Salt API\u5229\u7528\u8be5\u6f0f\u6d1e\u8fdb\u884csalt.utils.thin.gen_thin()\u547d\u4ee4\u6ce8\u5165\u653b\u51fb\u3002",
"formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttps://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2021-15055",
"openTime": "2021-03-08",
"patchDescription": "SaltStack Salt\u662f\u4e00\u79cd\u5168\u65b0\u7684\u57fa\u7840\u8bbe\u65bd\u7ba1\u7406\u65b9\u5f0f\uff0c\u90e8\u7f72\u8f7b\u677e\uff0c\u5728\u51e0\u5206\u949f\u5185\u53ef\u8fd0\u884c\u8d77\u6765\uff0c\u6269\u5c55\u6027\u597d\uff0c\u5f88\u5bb9\u6613\u7ba1\u7406\u4e0a\u4e07\u53f0\u670d\u52a1\u5668\uff0c\u901f\u5ea6\u591f\u5feb\uff0c\u670d\u52a1\u5668\u4e4b\u95f4\u79d2\u7ea7\u901a\u8baf\u3002\r\n\r\nSaltStack Salt 3002.5\u4e4b\u524d\u7248\u672c\u5b58\u5728\u547d\u4ee4\u6ce8\u5165\u6f0f\u6d1e\u3002\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u5bf9\u5355\u5f15\u53f7\u548c\u53cc\u5f15\u53f7\u7684\u5904\u7406\u4e0d\u540c\u3002\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u5c06\u7279\u5236Web\u8bf7\u6c42\u53d1\u9001\u5230Salt API\u5229\u7528\u8be5\u6f0f\u6d1e\u8fdb\u884csalt.utils.thin.gen_thin()\u547d\u4ee4\u6ce8\u5165\u653b\u51fb\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "SaltStack Salt\u547d\u4ee4\u6ce8\u5165\u6f0f\u6d1e\uff08CNVD-2021-15055\uff09\u7684\u8865\u4e01",
"products": {
"product": "SaltStack SaltStack Salt \u003c3002.5"
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2021-3148",
"serverity": "\u9ad8",
"submitTime": "2021-03-01",
"title": "SaltStack Salt\u547d\u4ee4\u6ce8\u5165\u6f0f\u6d1e\uff08CNVD-2021-15055\uff09"
}
GSD-2021-3148
Vulnerability from gsd - Updated: 2023-12-13 01:23{
"GSD": {
"alias": "CVE-2021-3148",
"description": "An issue was discovered in SaltStack Salt before 3002.5. Sending crafted web requests to the Salt API can result in salt.utils.thin.gen_thin() command injection because of different handling of single versus double quotes. This is related to salt/utils/thin.py.",
"id": "GSD-2021-3148",
"references": [
"https://www.suse.com/security/cve/CVE-2021-3148.html",
"https://www.debian.org/security/2021/dsa-5011",
"https://security.archlinux.org/CVE-2021-3148"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2021-3148"
],
"details": "An issue was discovered in SaltStack Salt before 3002.5. Sending crafted web requests to the Salt API can result in salt.utils.thin.gen_thin() command injection because of different handling of single versus double quotes. This is related to salt/utils/thin.py.",
"id": "GSD-2021-3148",
"modified": "2023-12-13T01:23:34.609121Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-3148",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in SaltStack Salt before 3002.5. Sending crafted web requests to the Salt API can result in salt.utils.thin.gen_thin() command injection because of different handling of single versus double quotes. This is related to salt/utils/thin.py."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/saltstack/salt/releases",
"refsource": "MISC",
"url": "https://github.com/saltstack/salt/releases"
},
{
"name": "https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/",
"refsource": "CONFIRM",
"url": "https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/"
},
{
"name": "FEDORA-2021-904a2dbc0c",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YOGNT2XWPOYV7YT75DN7PS4GIYWFKOK5/"
},
{
"name": "FEDORA-2021-5756fbf8a6",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7GRVZ5WAEI3XFN2BDTL6DDXFS5HYSDVB/"
},
{
"name": "FEDORA-2021-43eb5584ad",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FUGLOJ6NXLCIFRD2JTXBYQEMAEF2B6XH/"
},
{
"name": "GLSA-202103-01",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/202103-01"
},
{
"name": "[debian-lts-announce] 20211110 [SECURITY] [DLA 2815-1] salt security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00009.html"
},
{
"name": "DSA-5011",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2021/dsa-5011"
},
{
"name": "GLSA-202310-22",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/202310-22"
}
]
}
},
"gitlab.com": {
"advisories": [
{
"affected_range": "\u003c2015.8.13||\u003e=2016.3.0,\u003c2016.11.5||\u003e=2016.11.7,\u003c2016.11.10|| \u003e=2017.5.0,\u003c2017.7.8||\u003e=2018.2.0,\u003c=2018.3.5||\u003e=2019.2.0,\u003c2019.2.8||\u003e=3000,\u003c3000.6||\u003e=3001,\u003c3001.4||\u003e=3002,\u003c3002.5",
"affected_versions": "All versions before 2015.8.13, all versions starting from 2016.3.0 before 2016.11.5, all versions starting from 2016.11.7 before 2016.11.10, all versions starting from 2017.5.0 before 2017.7.8, all versions starting from 2018.2.0 up to 2018.3.5, all versions starting from 2019.2.0 before 2019.2.8, all versions starting from 3000 before 3000.6, all versions starting from 3001 before 3001.4, all versions starting from 3002 before 3002.5",
"cvss_v2": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"cwe_ids": [
"CWE-1035",
"CWE-77",
"CWE-937"
],
"date": "2021-11-23",
"description": "An issue was discovered in SaltStack Salt. By sending crafted web requests to the Salt API can result in `salt.utils.thin.gen_thin()` command injection because of different handling of single versus double quotes. This is related to `salt/utils/thin.py.`",
"fixed_versions": [
"2015.8.13",
"2016.11.5",
"2016.11.10",
"2017.7.8",
"2019.2.8",
"3000.6",
"3001.4",
"3002.5"
],
"identifier": "CVE-2021-3148",
"identifiers": [
"CVE-2021-3148"
],
"not_impacted": "All versions starting from 2015.8.13 before 2016.3.0, all versions starting from 2016.11.5 before 2016.11.7, all versions starting from 2016.11.10 before 2017.5.0, all versions starting from 2017.7.8 before 2018.2.0, all versions after 2018.3.5 before 2019.2.0, all versions starting from 2019.2.8 before 3000, all versions starting from 3000.6 before 3001, all versions starting from 3001.4 before 3002, all versions starting from 3002.5",
"package_slug": "pypi/salt",
"pubdate": "2021-02-27",
"solution": "Upgrade to versions 2015.8.13, 2016.11.5, 2016.11.10, 2017.7.8, 2019.2.8, 3000.6, 3001.4, 3002.5 or above.",
"title": "Command Injection",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2021-3148",
"https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/"
],
"uuid": "041809f4-86fc-4446-8c4b-6a53d4f3b105"
}
]
},
"nvd.nist.gov": {
"cve": {
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0F9405E3-F2B0-41BA-A39D-61BB38475A59",
"versionEndExcluding": "2015.8.10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A35C23D3-82D4-46E7-BF08-9229C04C0C3D",
"versionEndExcluding": "2015.8.13",
"versionStartIncluding": "2015.8.11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B4741BD5-4C40-48BC-A2C1-E6AB33818201",
"versionEndExcluding": "2016.3.4",
"versionStartIncluding": "2016.3.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7D28A2B5-316A-45DC-AC85-A0F743C4B3C4",
"versionEndExcluding": "2016.3.6",
"versionStartIncluding": "2016.3.5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*",
"matchCriteriaId": "17C96153-85C1-45DC-A48B-46A3900246E2",
"versionEndExcluding": "2016.3.8",
"versionStartIncluding": "2016.3.7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*",
"matchCriteriaId": "67FBC561-336A-4F25-B347-C4CA029B6E30",
"versionEndExcluding": "2016.11.3",
"versionStartIncluding": "2016.3.9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A5E17739-655C-4FAC-A73B-985132B32C73",
"versionEndExcluding": "2016.11.5",
"versionStartIncluding": "2016.11.4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*",
"matchCriteriaId": "11D84847-0C8A-473A-9186-46FABD7BB59A",
"versionEndExcluding": "2016.11.10",
"versionStartIncluding": "2016.11.7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3721B047-2595-4E79-8FDD-B1224FC0DD2C",
"versionEndExcluding": "2017.7.8",
"versionStartIncluding": "2017.5.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EB8FA088-6AAD-46DF-884C-7362CB4BE430",
"versionEndIncluding": "2018.3.5",
"versionStartIncluding": "2018.2.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F7A2912C-7F48-465D-B7F2-93ECD0D0CB74",
"versionEndExcluding": "2019.2.5",
"versionStartIncluding": "2019.2.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*",
"matchCriteriaId": "40369149-A5C3-4759-844F-3510559397C5",
"versionEndExcluding": "2019.2.8",
"versionStartIncluding": "2019.2.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*",
"matchCriteriaId": "906D2835-186A-455E-84EB-E982564B9CBD",
"versionEndExcluding": "3000.6",
"versionStartIncluding": "3000",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5F0E0DA3-49F7-4938-9FBD-F3680B1BDBB6",
"versionEndExcluding": "3001.4",
"versionStartIncluding": "3001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6B757DF0-6490-4FE7-9C98-5D8C700A4377",
"versionEndExcluding": "3002.5",
"versionStartIncluding": "3002",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in SaltStack Salt before 3002.5. Sending crafted web requests to the Salt API can result in salt.utils.thin.gen_thin() command injection because of different handling of single versus double quotes. This is related to salt/utils/thin.py."
},
{
"lang": "es",
"value": "Se detect\u00f3 un problema en SaltStack Salt versiones anteriores a 3002.5.\u0026#xa0;El env\u00edo de peticiones web dise\u00f1adas a la API de Salt puede resultar en una inyecci\u00f3n del comando de la funci\u00f3n salt.utils.thin.gen_thin() debido al manejo diferente de las comillas simples y las dobles.\u0026#xa0;Esto est\u00e1 relacionado con el archivo salt/utils/thin.py"
}
],
"id": "CVE-2021-3148",
"lastModified": "2023-12-21T18:31:34.073",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-02-27T05:15:14.190",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/saltstack/salt/releases"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00009.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7GRVZ5WAEI3XFN2BDTL6DDXFS5HYSDVB/"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FUGLOJ6NXLCIFRD2JTXBYQEMAEF2B6XH/"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YOGNT2XWPOYV7YT75DN7PS4GIYWFKOK5/"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202103-01"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202310-22"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2021/dsa-5011"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-77"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
}
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.