CVE-2013-4438
Severity CVSS v4.0:
Pending analysis
Type:
CWE-94
Code Injection
Publication date:
05/11/2013
Last modified:
11/04/2025
Description
Salt (aka SaltStack) before 0.17.1 allows remote attackers to execute arbitrary YAML code via unspecified vectors. NOTE: the vendor states that this might not be a vulnerability because the YAML to be loaded has already been determined to be safe.
Impact
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:* | 0.17.0 (including) | |
| cpe:2.3:a:saltstack:salt:0.6.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:saltstack:salt:0.7.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:saltstack:salt:0.8.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:saltstack:salt:0.8.7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:saltstack:salt:0.8.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:saltstack:salt:0.8.9:*:*:*:*:*:*:* | ||
| cpe:2.3:a:saltstack:salt:0.9.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:saltstack:salt:0.9.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:saltstack:salt:0.9.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:saltstack:salt:0.9.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:saltstack:salt:0.9.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:saltstack:salt:0.9.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:saltstack:salt:0.9.7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:saltstack:salt:0.9.8:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



