In SaltStack Salt through 2019.2.0, the salt-api NET API with the ssh client enabled is vulnerable to command injection. This allows an unauthenticated attacker with network access to the API endpoint to execute arbitrary code on the salt-api host.
References
Link | Resource |
---|---|
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00026.html | Mailing List Third Party Advisory |
https://docs.saltstack.com/en/latest/topics/releases/2019.2.3.html#security-fix | Release Notes Third Party Advisory |
https://github.com/saltstack/salt/commits/master | Patch Third Party Advisory |
https://usn.ubuntu.com/4459-1/ | Third Party Advisory |
https://www.debian.org/security/2020/dsa-4676 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
No history.
Information
Published : 2020-01-17 02:15
Updated : 2024-02-04 20:39
NVD link : CVE-2019-17361
Mitre link : CVE-2019-17361
CVE.ORG link : CVE-2019-17361
JSON object : View
Products Affected
saltstack
- salt
debian
- debian_linux
canonical
- ubuntu_linux
opensuse
- leap
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')