vulnerability
FreeBSD: VID-a1e03a3d-7be0-11eb-b392-20cf30e32f6d (CVE-2020-28972): salt -- multiple vulnerabilities
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:N/AC:M/Au:N/C:P/I:N/A:N) | Mar 3, 2021 | Mar 4, 2021 | Dec 10, 2025 |
Severity
4
CVSS
(AV:N/AC:M/Au:N/C:P/I:N/A:N)
Published
Mar 3, 2021
Added
Mar 4, 2021
Modified
Dec 10, 2025
Description
SaltStack reports multiple security vulnerabilities in Salt CVE-2021-3197: The Salt-API.s SSH client is vulnerable to a shell injection by including ProxyCommand in an argument, or via ssh_options provided in an API request. CVE-2021-25281: The Salt-API does not have eAuth credentials for the wheel_async client. CVE-2021-25282: The salt.wheel.pillar_roots.write method is vulnerable to directory traversal. CVE-2021-25283: The jinja renderer does not protect against server-side template injection attacks. CVE-2021-25284: webutils write passwords in cleartext to /var/log/salt/minion CVE-2021-3148: command injection in salt.utils.thin.gen_thin() CVE-2020-35662: Several places where Salt was not verifying the SSL cert by default. CVE-2021-3144: eauth Token can be used once after expiration. CVE-2020-28972: Code base not validating SSL/TLS certificate of the server, which might allow attackers to obtain sensitive information via a man-in-the-middle attack CVE-2020-28243: Local Privilege Escalation in the Minion.
Solutions
freebsd-upgrade-package-py36-salt-2019freebsd-upgrade-package-py37-salt-2019freebsd-upgrade-package-py38-salt-2019freebsd-upgrade-package-py36-saltfreebsd-upgrade-package-py37-saltfreebsd-upgrade-package-py38-saltfreebsd-upgrade-package-py39-salt
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.