Arbitrary Code Execution Affecting salt package, versions [2015.8,2015.8.4)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.16% (54th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Arbitrary Code Execution vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PYTHON-SALT-40379
  • published1 Aug 2017
  • disclosed4 Aug 2015
  • creditUnknown

Introduced: 4 Aug 2015

CVE-2016-1866  (opens in a new tab)
CWE-94  (opens in a new tab)

Overview

salt is a Portable, distributed, remote execution and configuration management system.

Salt 2015.8.x before 2015.8.4 does not properly handle clear messages on the minion, which allows man-in-the-middle attackers to execute arbitrary code by inserting packets into the minion-master data stream.

References

CVSS Scores

version 3.1