CVE-2021-33226

Buffer Overflow vulnerability in Saltstack v.3003 and before allows attacker to execute arbitrary code via the func variable in salt/salt/modules/status.py file. NOTE: this is disputed by third parties because an attacker cannot influence the eval input
Configurations

Configuration 1 (hide)

cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*

History

07 Nov 2023, 03:35

Type Values Removed Values Added
Summary ** DISPUTED ** Buffer Overflow vulnerability in Saltstack v.3003 and before allows attacker to execute arbitrary code via the func variable in salt/salt/modules/status.py file. NOTE: this is disputed by third parties because an attacker cannot influence the eval input Buffer Overflow vulnerability in Saltstack v.3003 and before allows attacker to execute arbitrary code via the func variable in salt/salt/modules/status.py file. NOTE: this is disputed by third parties because an attacker cannot influence the eval input

Information

Published : 2023-02-17 18:15

Updated : 2024-08-04 00:15


NVD link : CVE-2021-33226

Mitre link : CVE-2021-33226

CVE.ORG link : CVE-2021-33226


JSON object : View

Products Affected

saltstack

  • salt
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')