Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2013-4438
Deferred
More InfoOfficial Page
Source-secalert@redhat.com
View Known Exploited Vulnerability (KEV) details
Published At-05 Nov, 2013 | 18:55
Updated At-11 Apr, 2025 | 00:51

Salt (aka SaltStack) before 0.17.1 allows remote attackers to execute arbitrary YAML code via unspecified vectors. NOTE: the vendor states that this might not be a vulnerability because the YAML to be loaded has already been determined to be safe.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.07.5HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
CPE Matches

saltstack
saltstack
>>salt>>Versions up to 0.17.0(inclusive)
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*
saltstack
saltstack
>>salt>>0.6.0
cpe:2.3:a:saltstack:salt:0.6.0:*:*:*:*:*:*:*
saltstack
saltstack
>>salt>>0.7.0
cpe:2.3:a:saltstack:salt:0.7.0:*:*:*:*:*:*:*
saltstack
saltstack
>>salt>>0.8.0
cpe:2.3:a:saltstack:salt:0.8.0:*:*:*:*:*:*:*
saltstack
saltstack
>>salt>>0.8.7
cpe:2.3:a:saltstack:salt:0.8.7:*:*:*:*:*:*:*
saltstack
saltstack
>>salt>>0.8.8
cpe:2.3:a:saltstack:salt:0.8.8:*:*:*:*:*:*:*
saltstack
saltstack
>>salt>>0.8.9
cpe:2.3:a:saltstack:salt:0.8.9:*:*:*:*:*:*:*
saltstack
saltstack
>>salt>>0.9.0
cpe:2.3:a:saltstack:salt:0.9.0:*:*:*:*:*:*:*
saltstack
saltstack
>>salt>>0.9.2
cpe:2.3:a:saltstack:salt:0.9.2:*:*:*:*:*:*:*
saltstack
saltstack
>>salt>>0.9.3
cpe:2.3:a:saltstack:salt:0.9.3:*:*:*:*:*:*:*
saltstack
saltstack
>>salt>>0.9.4
cpe:2.3:a:saltstack:salt:0.9.4:*:*:*:*:*:*:*
saltstack
saltstack
>>salt>>0.9.5
cpe:2.3:a:saltstack:salt:0.9.5:*:*:*:*:*:*:*
saltstack
saltstack
>>salt>>0.9.6
cpe:2.3:a:saltstack:salt:0.9.6:*:*:*:*:*:*:*
saltstack
saltstack
>>salt>>0.9.7
cpe:2.3:a:saltstack:salt:0.9.7:*:*:*:*:*:*:*
saltstack
saltstack
>>salt>>0.9.8
cpe:2.3:a:saltstack:salt:0.9.8:*:*:*:*:*:*:*
saltstack
saltstack
>>salt>>0.9.9
cpe:2.3:a:saltstack:salt:0.9.9:*:*:*:*:*:*:*
saltstack
saltstack
>>salt>>0.10.0
cpe:2.3:a:saltstack:salt:0.10.0:*:*:*:*:*:*:*
saltstack
saltstack
>>salt>>0.10.2
cpe:2.3:a:saltstack:salt:0.10.2:*:*:*:*:*:*:*
saltstack
saltstack
>>salt>>0.10.3
cpe:2.3:a:saltstack:salt:0.10.3:*:*:*:*:*:*:*
saltstack
saltstack
>>salt>>0.10.4
cpe:2.3:a:saltstack:salt:0.10.4:*:*:*:*:*:*:*
saltstack
saltstack
>>salt>>0.10.5
cpe:2.3:a:saltstack:salt:0.10.5:*:*:*:*:*:*:*
saltstack
saltstack
>>salt>>0.11.0
cpe:2.3:a:saltstack:salt:0.11.0:*:*:*:*:*:*:*
saltstack
saltstack
>>salt>>0.12.0
cpe:2.3:a:saltstack:salt:0.12.0:*:*:*:*:*:*:*
saltstack
saltstack
>>salt>>0.13.0
cpe:2.3:a:saltstack:salt:0.13.0:*:*:*:*:*:*:*
saltstack
saltstack
>>salt>>0.14.0
cpe:2.3:a:saltstack:salt:0.14.0:*:*:*:*:*:*:*
saltstack
saltstack
>>salt>>0.15.0
cpe:2.3:a:saltstack:salt:0.15.0:*:*:*:*:*:*:*
saltstack
saltstack
>>salt>>0.15.1
cpe:2.3:a:saltstack:salt:0.15.1:*:*:*:*:*:*:*
saltstack
saltstack
>>salt>>0.16.0
cpe:2.3:a:saltstack:salt:0.16.0:*:*:*:*:*:*:*
saltstack
saltstack
>>salt>>0.16.2
cpe:2.3:a:saltstack:salt:0.16.2:*:*:*:*:*:*:*
saltstack
saltstack
>>salt>>0.16.3
cpe:2.3:a:saltstack:salt:0.16.3:*:*:*:*:*:*:*
saltstack
saltstack
>>salt>>0.16.4
cpe:2.3:a:saltstack:salt:0.16.4:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-94Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://docs.saltstack.com/topics/releases/0.17.1.htmlsecalert@redhat.com
Patch
Vendor Advisory
http://www.openwall.com/lists/oss-security/2013/10/18/3secalert@redhat.com
N/A
http://docs.saltstack.com/topics/releases/0.17.1.htmlaf854a3a-2127-422b-91ae-364da2661108
Patch
Vendor Advisory
http://www.openwall.com/lists/oss-security/2013/10/18/3af854a3a-2127-422b-91ae-364da2661108
N/A
Change History
0Changes found

Details not found