-
Notifications
You must be signed in to change notification settings - Fork 17
Script is throwing error while running it on 2016.x.x and also on 2019.2.2 #16
Comments
Can you run |
1.CentOS release 6.8 (Final) 2.CentOS Linux release 7.3.1611 (Core) python salt-cve-check.py DEBUG 3.it ran well on test server that I installed to check this script CentOS Linux release 7.7.1908 (Core) python salt-cve-check.py DEBUG |
Is this salt shipped with
The check scripts assumes it is ran as root on salt-master, with default config. No external auth, or other. It has to read the |
It is configured through saltstack repository. |
Looks the script, it reads the token file. I've not fully explorer how it works, but I believe salt generates as way to authenticate local commands. Every time you run |
python salt-cve-check.py
[+] Python version: 2.6.6
[+] Salt version: 2016.3.3
[ ] This version of salt is vulnerable! Check results below
[+] Checking salt-master (127.0.0.1:4506) status... ONLINE
[+] Checking if vulnerable to CVE-2020-11651... YES
[+] Checking if vulnerable to CVE-2020-11652 (read_token)... YES
[+] Checking if vulnerable to CVE-2020-11652 (read)... Traceback (most recent call last):
File "salt-cve-check.py", line 248, in
retn |= check_CVE_2020_11652_read()
File "salt-cve-check.py", line 150, in check_CVE_2020_11652_read
if rets['data']['return']:
KeyError: u'data'
The text was updated successfully, but these errors were encountered: