In SaltStack Salt through 2019.2.0, the salt-api NET API with the ssh client enabled is vulnerable to command injection. This allows an unauthenticated attacker with network access to the API endpoint to execute arbitrary code on the salt-api host.
References
Link | Resource |
---|---|
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00026.html | Mailing List Third Party Advisory |
https://docs.saltstack.com/en/latest/topics/releases/2019.2.3.html#security-fix | Release Notes Third Party Advisory |
https://github.com/saltstack/salt/commits/master | Patch Third Party Advisory |
https://usn.ubuntu.com/4459-1/ | Third Party Advisory |
https://www.debian.org/security/2020/dsa-4676 | Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00026.html | Mailing List Third Party Advisory |
https://docs.saltstack.com/en/latest/topics/releases/2019.2.3.html#security-fix | Release Notes Third Party Advisory |
https://github.com/saltstack/salt/commits/master | Patch Third Party Advisory |
https://usn.ubuntu.com/4459-1/ | Third Party Advisory |
https://www.debian.org/security/2020/dsa-4676 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 04:32
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00026.html - Mailing List, Third Party Advisory | |
References | () https://docs.saltstack.com/en/latest/topics/releases/2019.2.3.html#security-fix - Release Notes, Third Party Advisory | |
References | () https://github.com/saltstack/salt/commits/master - Patch, Third Party Advisory | |
References | () https://usn.ubuntu.com/4459-1/ - Third Party Advisory | |
References | () https://www.debian.org/security/2020/dsa-4676 - Third Party Advisory |
Information
Published : 2020-01-17 02:15
Updated : 2024-11-21 04:32
NVD link : CVE-2019-17361
Mitre link : CVE-2019-17361
CVE.ORG link : CVE-2019-17361
JSON object : View
Products Affected
debian
- debian_linux
canonical
- ubuntu_linux
opensuse
- leap
saltstack
- salt
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')