Safety vulnerability ID: 54112
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Salt 2015.8.x before 2015.8.4 does not properly handle clear messages on the minion, which allows man-in-the-middle attackers to execute arbitrary code by inserting packets into the minion-master data stream.
Latest version: 3007.1
Portable, distributed, remote execution and configuration management system
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application