Buffer Overflow vulnerability in Saltstack v.3003 and before allows attacker to execute arbitrary code via the func variable in salt/salt/modules/status.py file. NOTE: this is disputed by third parties because an attacker cannot influence the eval input
References
Link | Resource |
---|---|
https://bugzilla.suse.com/show_bug.cgi?id=1208473 | |
https://github.com/saltstack/salt/blob/master/salt/modules/status.py | Exploit Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2023-02-17T00:00:00
Updated: 2023-03-02T00:00:00
Reserved: 2021-05-20T00:00:00
Link: CVE-2021-33226
JSON object: View
NVD Information
Status : Modified
Published: 2023-02-17T18:15:11.083
Modified: 2024-05-17T01:57:52.580
Link: CVE-2021-33226
JSON object: View
Redhat Information
No data.
CWE