{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-02T20:43:21.226","vulnerabilities":[{"cve":{"id":"CVE-2019-1010259","sourceIdentifier":"josh@bress.net","published":"2019-07-18T17:15:11.567","lastModified":"2024-11-21T04:18:06.337","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"SaltStack Salt 2018.3, 2019.2 is affected by: SQL Injection. The impact is: An attacker could escalate privileges on MySQL server deployed by cloud provider. It leads to RCE. The component is: The mysql.user_chpass function from the MySQL module for Salt. The attack vector is: specially crafted password string. The fixed version is: 2018.3.4."},{"lang":"es","value":"SaltStack Salt 2018.3, 2019.2 está afectado por: Inyección de SQL. El impacto es: un atacante podría aumentar los privilegios en el servidor MySQL implementado por el proveedor de la nube. Conduce a RCE. El componente es: la función mysql.user_chpass del módulo MySQL para Salt.El vector de ataque es: cadena de contraseña especialmente diseñada. La versión fija es: 2018.3.4."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-89"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:saltstack:salt_2018:3.0:*:*:*:*:*:*:*","matchCriteriaId":"6662A1C8-AD13-4AB5-8AFE-211E861F27F0"},{"vulnerable":true,"criteria":"cpe:2.3:a:saltstack:salt_2019:2.0:*:*:*:*:*:*:*","matchCriteriaId":"2FEEB334-19AA-49F3-BD25-0874DF47505F"}]}]}],"references":[{"url":"https://github.com/ShantonRU/salt/commit/a46c86a987c78e74e87969d8d3b27094e6544b7a","source":"josh@bress.net","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/saltstack/salt/blob/f22de0887cd7167887f113bf394244b74fb36b6b/salt/modules/mysql.py#L1534","source":"josh@bress.net","tags":["Exploit","Third Party Advisory"]},{"url":"https://github.com/saltstack/salt/pull/51462","source":"josh@bress.net","tags":["Issue Tracking","Patch","Third Party Advisory"]},{"url":"https://github.com/ShantonRU/salt/commit/a46c86a987c78e74e87969d8d3b27094e6544b7a","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/saltstack/salt/blob/f22de0887cd7167887f113bf394244b74fb36b6b/salt/modules/mysql.py#L1534","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]},{"url":"https://github.com/saltstack/salt/pull/51462","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking","Patch","Third Party Advisory"]}]}}]}