Description
In SaltStack Salt through 2019.2.0, the salt-api NET API with the ssh client enabled is vulnerable to command injection. This allows an unauthenticated attacker with network access to the API endpoint to execute arbitrary code on the salt-api host.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-4676-1 | salt security update |
Github GHSA |
GHSA-q53j-p6r2-g2v4 | SaltStack Salt is vulnerable to command injection |
Ubuntu USN |
USN-4459-1 | Salt vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T01:40:15.336Z
Reserved: 2019-10-08T00:00:00.000Z
Link: CVE-2019-17361
No data.
Status : Modified
Published: 2020-01-17T02:15:11.493
Modified: 2024-11-21T04:32:10.850
Link: CVE-2019-17361
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
Github GHSA
Ubuntu USN