Directory Traversal vulnerability in salt-api in SaltStack Salt before 2017.7.8 and 2018.3.x before 2018.3.3 allows remote attackers to determine which files exist on the server.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:51
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00070.html - | |
References | () https://docs.saltstack.com/en/2017.7/topics/releases/2017.7.8.html - Release Notes, Vendor Advisory | |
References | () https://docs.saltstack.com/en/latest/topics/releases/2018.3.3.html - Release Notes, Vendor Advisory | |
References | () https://groups.google.com/d/msg/salt-users/L9xqcJ0UXxs/qgDj42obBQAJ - Release Notes, Third Party Advisory | |
References | () https://groups.google.com/d/msg/salt-users/dimVF7rpphY/jn3Xv3MbBQAJ - Release Notes, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2020/07/msg00024.html - | |
References | () https://usn.ubuntu.com/4459-1/ - |
Information
Published : 2018-10-24 22:29
Updated : 2024-11-21 03:51
NVD link : CVE-2018-15750
Mitre link : CVE-2018-15750
CVE.ORG link : CVE-2018-15750
JSON object : View
Products Affected
saltstack
- salt
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')