In SaltStack Salt through 2019.2.0, the salt-api NET API with the ssh client enabled is vulnerable to command injection. This allows an unauthenticated attacker with network access to the API endpoint to execute arbitrary code on the salt-api host.
References
Link | Resource |
---|---|
https://docs.saltstack.com/en/latest/topics/releases/2019.2.3.html#security-fix | Release Notes Third Party Advisory |
https://github.com/saltstack/salt/commits/master | Patch Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00026.html | Mailing List Third Party Advisory |
https://www.debian.org/security/2020/dsa-4676 | Third Party Advisory |
https://usn.ubuntu.com/4459-1/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2020-01-16 18:15
Updated : 2023-01-31 13:03
NVD link : CVE-2019-17361
Mitre link : CVE-2019-17361
JSON object : View
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
Products Affected
debian
- debian_linux
canonical
- ubuntu_linux
saltstack
- salt
opensuse
- leap