|Category:||Debian Local Security Checks|
|Title:||Debian LTS: Security Advisory for salt (DLA-2223-1)|
|Summary:||The remote host is missing an update for the 'salt'; package(s) announced via the DLA-2223-1 advisory.|
The remote host is missing an update for the 'salt'
package(s) announced via the DLA-2223-1 advisory.
Several vulnerabilities were discovered in package salt, a
configuration management and infrastructure automation software.
The salt-master process ClearFuncs class does not properly validate
method calls. This allows a remote user to access some methods
without authentication. These methods can be used to retrieve user
tokens from the salt master and/or run arbitrary commands on salt
The salt-master process ClearFuncs class allows access to some
methods that improperly sanitize paths. These methods allow
arbitrary directory access to authenticated users.
'salt' package(s) on Debian Linux.
For Debian 8 'Jessie', these problems have been fixed in version
We recommend that you upgrade your salt packages.
Common Vulnerability Exposure (CVE) ID: CVE-2020-11651|
Common Vulnerability Exposure (CVE) ID: CVE-2020-11652
|Copyright||Copyright (C) 2020 Greenbone Networks GmbH|
|This is only one of 85075 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.