-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stems from the _git_run function in salt/modules/git.py. The commit diff shows this function was modified to add 'output_loglevel='quiet'' and to process stderr through _remove_sensitive_data. Prior to the patch, stderr from failed git commands (e.g., HTTPS clone operations with embedded credentials) was directly appended to error messages and logged. The absence of credential redaction in the error handling path made this function the root cause of the sensitive data leak. The addition of _remove_sensitive_data and loglevel adjustments in the patch confirms this was the vulnerable code path.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| salt | pip | < 2015.5.5 | 2015.5.5 |
KEV Misses 88% of Exploited CVEs- Get the report