-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stems from the _is_text_file function in Salt's snapper module. This function constructs a shell command using os.popen() with direct string interpolation of the filename parameter. Since filenames can contain malicious payloads (e.g., '$(command>)'), this creates a command injection vector. The security advisory explicitly mentions 'popen unsafely' and the referenced technical analysis demonstrates how filename manipulation leads to RCE. The function's replacement with subprocess.run() in patched versions confirms its role in the vulnerability.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| salt | pip | >= 2016.11.0, <= 3002.6 | 3003rc1 |
Ongoing coverage of React2Shell