In SaltStack Salt through 2019.2.0, the salt-api NET API with the ssh client enabled is vulnerable to command injection. This allows an unauthenticated attacker with network access to the API endpoint to execute arbitrary code on the salt-api host.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-4676-1 | salt security update |
Github GHSA |
GHSA-q53j-p6r2-g2v4 | SaltStack Salt is vulnerable to command injection |
Ubuntu USN |
USN-4459-1 | Salt vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T01:40:15.336Z
Reserved: 2019-10-08T00:00:00
Link: CVE-2019-17361
No data.
Status : Modified
Published: 2020-01-17T02:15:11.493
Modified: 2024-11-21T04:32:10.850
Link: CVE-2019-17361
OpenCVE Enrichment
No data.
Debian DSA
Github GHSA
Ubuntu USN