salt

condav2016.3.0

Software to automate the management and configuration of any infrastructure or application at scale

License Apache License 2.0permissive2 versions1 maintainers0 deps142 weekly dl
22
/ 100
Health
do not use

salt has critical vulnerabilities — do not use

Update to >= 3003.1 to fix known vulnerabilities

  • Low health score (22/100)
  • 19 high severity vulnerabilities
  • 12 critical vulnerabilities
Health breakdown0 – 100
5/25
maintenance
3/20
popularity
0/25
security
12/15
maturity
2/15
community
Vulnerabilities
72
12 critical19 high7 medium34 low
Advisories (72)
SeverityIDSummaryFixed in
criticalCVE-2020-25592SaltStack Salt Improper Validation of eauth credentials and tokens in salt-netapi3002.1
highCVE-2022-22934SaltStack Improper Verification of Cryptographic Signature3003.4
highCVE-2024-22232Path traversal in saltstack3006.6
mediumCVE-2020-17490SaltStack Salt Allows creating certificates with weak file permissions3002.1
mediumCVE-2023-34049Salt preflight script could be attacker controlled3006.4
highCVE-2022-22936SaltStack Salt Authentication Bypass by Capture-replay3004.1
highCVE-2017-14696SaltStack Salt Denial of Service via a crafted authentication request2017.7.2
highCVE-2021-25282SaltStack Salt Directory Traversal vulnerability3002.3
highCVE-2025-62348Salt junos Module Vulnerable to Code Injection via Specially Crafted YAML Payload3006.17
highCVE-2017-5200SaltStack Salt arbitrary command execution in Salt-api via ssh_client2016.11.2
criticalCVE-2021-3197SaltStack Salt is vulnerable to shell injection via ProxyCommand argument3002.3
lowCVE-2022-22935SaltStack Salt Improper Authentication via Man in the Middle Attack3004.1
highCVE-2017-5192SaltStack Salt Authentication Bypass when using the local_batch client from salt-api2016.11.2
highCVE-2022-22967Salt's PAM auth fails to reject locked accounts3004.2
criticalCVE-2017-7893SaltStack Salt allows compromised salt-minions to impersonate the salt-master2016.3.6
criticalCVE-2021-3148SaltStack Salt command injection in the Salt-API when using the Salt-SSH client3002.3
criticalCVE-2017-14695SaltStack Salt Directory traversal vulnerability in minion id validation2017.7.2
highCVE-2021-21996Exposure of Resource to Wrong Sphere in salt3003.3
highCVE-2020-28243SaltStack Salt command injection via a crafted process name3002.3
criticalCVE-2020-11651SaltStack Salt Unauthenticated Remote Code Execution3000.2
... and 52 more
Threat intelligence
6 actively exploited (CISA KEV)4 likely exploited (EPSS ≥ 0.5)
Threat tier per vulnerability derived from CISA KEV catalog + FIRST.org EPSS scores.

Health History

Dependency Tree

License Audit

API access

Get this data programmatically — free, no authentication.

curl https://depscope.dev/api/check/conda/salt

First published · 2016-06-10 17:54:48.088000+00:00

Last updated · 2025-04-22 14:56:24.039000+00:00

salt — Health Score 22/100 | DepScope