Description
Buffer Overflow vulnerability in Saltstack v.3003 and before allows attacker to execute arbitrary code via the func variable in salt/salt/modules/status.py file. NOTE: this is disputed by third parties because an attacker cannot influence the eval input
References (2)
Core 2
Core References
Exploit, Vendor Advisory
https://github.com/saltstack/salt/blob/master/salt/modules/status.py
Issue Tracking
https://bugzilla.suse.com/show_bug.cgi?id=1208473
Scores
CVSS v3
9.8
EPSS
0.0401
EPSS Percentile
88.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
total
Details
CWE
CWE-120
Status
published
Products (1)
saltstack/salt
< 3003
Published
Feb 17, 2023
Tracked Since
Feb 18, 2026