In SaltStack Salt through 2019.2.0, the salt-api NET API with the ssh client enabled is vulnerable to command injection. This allows an unauthenticated attacker with network access to the API endpoint to execute arbitrary code on the salt-api host.
Advisories
Source ID Title
Debian DSA Debian DSA DSA-4676-1 salt security update
Github GHSA Github GHSA GHSA-q53j-p6r2-g2v4 SaltStack Salt is vulnerable to command injection
Ubuntu USN Ubuntu USN USN-4459-1 Salt vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T01:40:15.336Z

Reserved: 2019-10-08T00:00:00

Link: CVE-2019-17361

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-01-17T02:15:11.493

Modified: 2024-11-21T04:32:10.850

Link: CVE-2019-17361

cve-icon Redhat

Severity : Important

Publid Date: 2020-01-16T00:00:00Z

Links: CVE-2019-17361 - Bugzilla

cve-icon OpenCVE Enrichment

No data.