Improper Input Validation Affecting salt package, versions <0.17.1+dfsg-1
Threat Intelligence
EPSS
0.23% (62nd
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN10-SALT-292672
- published 5 Nov 2013
- disclosed 5 Nov 2013
How to fix?
Upgrade Debian:10 salt to version 0.17.1+dfsg-1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream salt package and not the salt package as distributed by Debian.
See How to fix? for Debian:10 relevant fixed versions and status.
The default configuration for salt-ssh in Salt (aka SaltStack) 0.17.0 does not validate the SSH host key of requests, which allows remote attackers to have unspecified impact via a man-in-the-middle (MITM) attack.
CVSS Scores
version 3.1