CVE-2020-28243
HIGHSalt < 2015.8.10 - Command Injection
Title source: ruleDescription
An issue was discovered in SaltStack Salt before 3002.5. The minion's restartcheck is vulnerable to command injection via a crafted process name. This allows for a local privilege escalation by any user able to create a files on the minion in a non-blacklisted directory.
Exploits (1)
References (11)
Scores
CVSS v3
7.8
EPSS
0.0141
EPSS Percentile
80.5%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-77
Status
published
Products (8)
debian/debian_linux
9.0
debian/debian_linux
10.0
debian/debian_linux
11.0
fedoraproject/fedora
32
fedoraproject/fedora
33
fedoraproject/fedora
34
pypi/salt
0 - 2015.8.13PyPI
saltstack/salt
< 2015.8.10
Published
Feb 27, 2021
Tracked Since
Feb 18, 2026