salt is vulnerable to Return of Wrong Status Code
20
Low Risk
Affected versions of the package are vulnerable to returning the wrong status code. salt-call does not fail when it encounters bad pillar data. If the master returns invalid pillar data, salt-call uses a default value from the state instead of failing. This may result in invalid states being applied or a loss of pillar integrity.
You are affected if you are using a version that falls within the vulnerable range.
salt is vulnerable to Return of Wrong Status Code in versions 2014.1 - 3006.8.
Upgrade the salt library to the patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant