CVE-2017-5200 The advisory has been revoked - it doesn't affect any version of package salt  (opens in a new tab)


Threat Intelligence

EPSS
0.23% (62nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN11-SALT-543880
  • published26 Sept 2017
  • disclosed26 Sept 2017

Introduced: 26 Sep 2017

CVE-2017-5200  (opens in a new tab)

Amendment

The Debian security team deemed this advisory irrelevant for Debian:11.

NVD Description

Note: Versions mentioned in the description apply only to the upstream salt package and not the salt package as distributed by Debian.

Salt-api in SaltStack Salt before 2015.8.13, 2016.3.x before 2016.3.5, and 2016.11.x before 2016.11.2 allows arbitrary command execution on a salt-master via Salt's ssh_client.