First published: Wed Oct 24 2018(Updated: )
Directory Traversal vulnerability in salt-api in SaltStack Salt 2016.11.x before 2016.11.10, 2017.7.x before 2017.7.8 and 2018.3.x before 2018.3.3 allows remote attackers to determine which files exist on the server.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SaltStack Salt | <2017.7.8 | |
SaltStack Salt | >=2018.3.0<2018.3.3 | |
pip/salt | >=2016.11.0<2016.11.10 | 2016.11.10 |
pip/salt | >=2018.3.0<2018.3.3 | 2018.3.3 |
pip/salt | >=2017.7.0<2017.7.8 | 2017.7.8 |
debian/salt |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The CVE ID of this vulnerability is CVE-2018-15750.
The severity of CVE-2018-15750 is medium with a CVSS score of 5.3.
The affected software is SaltStack Salt before 2017.7.8 and 2018.3.x before 2018.3.3.
Remote attackers can exploit this vulnerability to determine which files exist on the server through directory traversal.
You can find more information about CVE-2018-15750 at the following references: [link1], [link2], [link3].