Description
In SaltStack Salt through 2019.2.0, the salt-api NET API with the ssh client enabled is vulnerable to command injection. This allows an unauthenticated attacker with network access to the API endpoint to execute arbitrary code on the salt-api host.
Published: 2020-01-17
Score: 9.8 Critical
EPSS: 18.5% Moderate
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-4676-1 salt security update
Github GHSA Github GHSA GHSA-q53j-p6r2-g2v4 SaltStack Salt is vulnerable to command injection
Ubuntu USN Ubuntu USN USN-4459-1 Salt vulnerabilities
History

No history.

Subscriptions

Canonical Ubuntu Linux
Debian Debian Linux
Opensuse Leap
Saltstack Salt
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T01:40:15.336Z

Reserved: 2019-10-08T00:00:00.000Z

Link: CVE-2019-17361

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-01-17T02:15:11.493

Modified: 2024-11-21T04:32:10.850

Link: CVE-2019-17361

cve-icon Redhat

Severity : Important

Publid Date: 2020-01-16T00:00:00Z

Links: CVE-2019-17361 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses