An issue was discovered in SaltStack Salt through 3002. Sending crafted web requests to the Salt API, with the SSH client enabled, can result in shell injection.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-2480-1 salt security update
Debian DLA Debian DLA DLA-2480-2 salt regression update
Debian DSA Debian DSA DSA-4837-1 salt security update
Github GHSA Github GHSA GHSA-qr38-h96j-2j3w SaltStack Salt Command Injection in netapi ssh client
Ubuntu USN Ubuntu USN USN-6948-1 Salt vulnerabilities
Ubuntu USN Ubuntu USN USN-7181-1 Salt vulnerability
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 07 Feb 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics kev

{'dateAdded': '2021-11-03'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'active', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 06 Feb 2025 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Opensuse
Opensuse leap
CPEs cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
Vendors & Products Opensuse
Opensuse leap

Wed, 14 Aug 2024 00:45:00 +0000

Type Values Removed Values Added
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-07-30T01:45:32.348Z

Reserved: 2020-08-04T00:00:00.000Z

Link: CVE-2020-16846

cve-icon Vulnrichment

Updated: 2024-08-04T13:45:33.237Z

cve-icon NVD

Status : Analyzed

Published: 2020-11-06T08:15:13.283

Modified: 2025-03-14T17:28:24.490

Link: CVE-2020-16846

cve-icon Redhat

Severity : Important

Publid Date: 2020-11-03T00:00:00Z

Links: CVE-2020-16846 - Bugzilla

cve-icon OpenCVE Enrichment

No data.