mirror of
https://github.com/0xMarcio/cve.git
synced 2026-02-12 18:42:46 +00:00
19 lines
780 B
Markdown
19 lines
780 B
Markdown
### [CVE-2021-33226](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33226)
|
|

|
|

|
|

|
|
|
|
### Description
|
|
|
|
Buffer Overflow vulnerability in Saltstack v.3003 and before allows attacker to execute arbitrary code via the func variable in salt/salt/modules/status.py file. NOTE: this is disputed by third parties because an attacker cannot influence the eval input
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
No PoCs from references.
|
|
|
|
#### Github
|
|
- https://github.com/20142995/nuclei-templates
|
|
- https://github.com/cyb3r-w0lf/nuclei-template-collection
|
|
|