Worker process denial of service through file read operation. .A vulnerability exists in the Master's “pub_ret” method which is exposed to all minions. The un-sanitized input value “jid” is used to construct a path which is then opened for reading. An attacker could exploit this vulnerabilities by attempting to read from a filename that will not return any data, e.g. by targeting a pipe node on the proc file system.
| Package (Ecosystem) | Introduced | Fixed | Limit |
|---|---|---|---|
| salt(PyPI) | 3007.0rc1 | 3007.4 | N/A |
| salt(PyPI) | 3006.0rc1 | 3006.12 | N/A |
CVSS Metrics