CVE-2019-17361
Published: 17 January 2020
In SaltStack Salt through 2019.2.0, the salt-api NET API with the ssh client enabled is vulnerable to command injection. This allows an unauthenticated attacker with network access to the API endpoint to execute arbitrary code on the salt-api host.
Priority
Status
Package | Release | Status |
---|---|---|
salt
Launchpad, Ubuntu, Debian |
bionic |
Released
(2017.7.4+dfsg1-1ubuntu18.04.2)
|
disco |
Ignored
(end of life)
|
|
eoan |
Ignored
(end of life)
|
|
focal |
Does not exist
|
|
jammy |
Not vulnerable
(3000+dfsg1-1)
|
|
kinetic |
Not vulnerable
(3000+dfsg1-1)
|
|
lunar |
Does not exist
|
|
mantic |
Does not exist
|
|
noble |
Does not exist
|
|
trusty |
Needed
|
|
upstream |
Needs triage
|
|
xenial |
Released
(2015.8.8+ds-1ubuntu0.1)
|
|
Patches:
upstream: https://github.com/saltstack/salt/commit/bca115f3f00fbde564dd2f12bf036b5d2fd08387 |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 9.8 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |