CVE-2020-16846
Published: 6 November 2020
An issue was discovered in SaltStack Salt through 3002. Sending crafted web requests to the Salt API, with the SSH client enabled, can result in shell injection.
Priority
Status
Package | Release | Status |
---|---|---|
salt Launchpad, Ubuntu, Debian |
groovy |
Ignored
(end of life)
|
bionic |
Needs triage
|
|
hirsute |
Ignored
(end of life)
|
|
kinetic |
Ignored
(end of life, was needs-triage)
|
|
xenial |
Needs triage
|
|
trusty |
Needs triage
|
|
focal |
Does not exist
|
|
impish |
Ignored
(end of life)
|
|
jammy |
Needs triage
|
|
lunar |
Does not exist
|
|
upstream |
Needs triage
|
|
mantic |
Does not exist
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 9.8 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |