CVE-2017-14695

Directory traversal vulnerability in minion id validation in SaltStack Salt before 2016.3.8, 2016.11.x before 2016.11.8, and 2017.7.x before 2017.7.2 allows remote minions with incorrect credentials to authenticate to a master via a crafted minion ID.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2017-12791.
Path Traversal
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
9.8 CRITICAL
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 62%
VendorProductVersion
saltstacksalt
𝑥
≤ 2016.3.7
saltstacksalt
2016.11
saltstacksalt
2016.11.0
saltstacksalt
2016.11.1
saltstacksalt
2016.11.1:rc1
saltstacksalt
2016.11.1:rc2
saltstacksalt
2016.11.2
saltstacksalt
2016.11.3
saltstacksalt
2016.11.4
saltstacksalt
2016.11.5
saltstacksalt
2016.11.6
saltstacksalt
2016.11.7
saltstacksalt
2017.7.0
saltstacksalt
2017.7.0:rc1
saltstacksalt
2017.7.1
𝑥
= Vulnerable software versions
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
salt
jammy
not-affected
impish
not-affected
hirsute
not-affected
groovy
not-affected
focal
dne
eoan
not-affected
disco
not-affected
cosmic
not-affected
bionic
not-affected
artful
ignored
zesty
ignored
xenial
Fixed 2015.8.8+ds-1ubuntu0.1+esm1
released
trusty
Fixed 0.17.5+ds-1ubuntu0.1~esm1
released