Buffer Overflow vulnerability in Saltstack v.3003 and before allows attacker to execute arbitrary code via the func variable in salt/salt/modules/status.py file. NOTE: this is disputed by third parties because an attacker cannot influence the eval input
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-03T23:42:20.345Z
Reserved: 2021-05-20T00:00:00
Link: CVE-2021-33226

No data.

Status : Modified
Published: 2023-02-17T18:15:11.083
Modified: 2024-11-21T06:08:33.643
Link: CVE-2021-33226

No data.