|Category:||Ubuntu Local Security Checks|
|Title:||Ubuntu: Security Advisory for salt (USN-4459-1)|
|Summary:||The remote host is missing an update for the 'salt'; package(s) announced via the USN-4459-1 advisory.|
The remote host is missing an update for the 'salt'
package(s) announced via the USN-4459-1 advisory.
It was discovered that Salt allows remote attackers to determine which files
exist on the server. An attacker could use that to extract sensitive
It was discovered that Salt has a vulnerability that allows an user to bypass
authentication. An attacker could use that to extract sensitive information,
execute arbitrary code or crash the server. (CVE-2018-15751)
It was discovered that Salt is vulnerable to command injection. This allows
an unauthenticated attacker with network access to the API endpoint to
execute arbitrary code on the salt-api host. (CVE-2019-17361)
It was discovered that Salt incorrectly validated method calls and
sanitized paths. A remote attacker could possibly use this issue to access
some methods without authentication. (CVE-2020-11651, CVE-2020-11652)
'salt' package(s) on Ubuntu 18.04 LTS, Ubuntu 16.04 LTS.
Please install the updated package(s).
Common Vulnerability Exposure (CVE) ID: CVE-2018-15750|
Common Vulnerability Exposure (CVE) ID: CVE-2018-15751
Common Vulnerability Exposure (CVE) ID: CVE-2019-17361
Common Vulnerability Exposure (CVE) ID: CVE-2020-11651
Common Vulnerability Exposure (CVE) ID: CVE-2020-11652
|Copyright||Copyright (C) 2020 Greenbone Networks GmbH|
|This is only one of 85075 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.