-
CVSS Score
-A Semantic Attack on Google Gemini - Read the Latest Research
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| salt | pip | >= 0.15.0, < 0.17.1 | 0.17.1 |
The vulnerability stems from insufficient identity validation in the Salt master's authentication process. The fix in pull request #7356 introduced a requirement for signed tokens encrypted with the minion's public key to prevent impersonation. The _verify_minion function (or equivalent) in the authentication flow would have been responsible for this validation. Prior to the patch, this function did not enforce token validation, allowing any minion with a valid key to impersonate others. The confidence is high because the fix explicitly adds token validation to close this vulnerability.