First published: Wed Oct 24 2018(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SaltStack Salt | <2017.7.8 | |
SaltStack Salt | >=2018.3.0<2018.3.3 | |
pip/salt | >=2016.11.0<2016.11.10 | 2016.11.10 |
pip/salt | >=2018.3.0<2018.3.3 | 2018.3.3 |
pip/salt | >=2017.7.0<2017.7.8 | 2017.7.8 |
debian/salt |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-15751 is a vulnerability in SaltStack Salt before 2017.7.8 and 2018.3.x before 2018.3.3 that allows remote attackers to bypass authentication and execute arbitrary commands.
The severity of CVE-2018-15751 is critical with a severity score of 9.8.
To fix CVE-2018-15751, update SaltStack Salt to version 2017.7.8 or newer for the 2017.7.x branch, or update to version 2018.3.3 or newer for the 2018.3.x branch.
You can find more information about CVE-2018-15751 in the following references: [CVE-2018-15751 on MITRE](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15751), [SaltStack Salt 2017.7.8 Release Notes](https://docs.saltstack.com/en/2017.7/topics/releases/2017.7.8.html), [SaltStack Salt 2018.3.3 Release Notes](https://docs.saltstack.com/en/latest/topics/releases/2018.3.3.html).
The Common Weakness Enumeration (CWE) number of CVE-2018-15751 is CWE-287.