First published: Wed Aug 26 2015(Updated: )
It was found that calling git.clone with https user/pass will leak the authentication details to the log. Upstream patch: <a href="https://github.com/saltstack/salt/commit/28aa9b105804ff433d8f663b2f9b804f2b75495a">https://github.com/saltstack/salt/commit/28aa9b105804ff433d8f663b2f9b804f2b75495a</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/salt | <2015.5.5 | 2015.5.5 |
debian/salt | ||
pip/salt | <2015.5.5 | 2015.5.5 |
SaltStack | <=5.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-6918 is considered a medium severity vulnerability due to the potential exposure of sensitive authentication details.
To remediate CVE-2015-6918, upgrade to salt version 2015.5.6 or later.
CVE-2015-6918 affects versions of the salt package prior to 2015.5.6.
If you are running salt version 2015.5.5 or earlier, your system is vulnerable to CVE-2015-6918.
CVE-2015-6918 can lead to the unintended leakage of user authentication credentials in log files.