CVE-2020-16846
on github
Published
Severity
CVSS v3:
9.8 CRITICAL
CVSS v2:
7.5 HIGH
Description
An issue was discovered in SaltStack Salt through 3002. Sending crafted web requests to the Salt API, with the SSH client enabled, can result in shell injection.
References
- https://github.com/saltstack/salt/releases
- https://www.saltstack.com/blog/on-november-3-2020-saltstack-publicly-disclosed-three-new-cves/
- https://lists.fedoraproject.org/archives/list/[email protected]/message/TPOGB2F6XUAIGFDTOCQDNB2VIXFXHWMA/
- http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00029.html
- https://security.gentoo.org/glsa/202011-13
- http://packetstormsecurity.com/files/160039/SaltStack-Salt-REST-API-Arbitrary-Command-Execution.html
- https://www.zerodayinitiative.com/advisories/ZDI-20-1380/
- https://www.zerodayinitiative.com/advisories/ZDI-20-1379/
- https://www.zerodayinitiative.com/advisories/ZDI-20-1383/
- https://www.zerodayinitiative.com/advisories/ZDI-20-1381/
- https://www.zerodayinitiative.com/advisories/ZDI-20-1382/
- https://lists.debian.org/debian-lts-announce/2020/12/msg00007.html
- https://www.debian.org/security/2021/dsa-4837
- https://lists.debian.org/debian-lts-announce/2022/01/msg00000.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TPOGB2F6XUAIGFDTOCQDNB2VIXFXHWMA/
Configurations
CPE23 | Version Start | Version End | Exact Version |
---|---|---|---|
cpe:2.3:a:saltstack:salt:3001:*:*:*:*:*:*:* | n/a | n/a | 3001 |
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:* | 2019.2.0 (including) | 2019.2.5 | * |
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:* | 3000.0 (including) | 3000.3 | * |
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:* | 2018.2.0 (including) | 2018.3.5 | * |
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:* | 2016.3.7 (including) | 2016.3.8 | * |
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:* | 2017.7.5 (including) | 2017.7.8 | * |
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:* | 2017.5.0 (including) | 2017.7.4 | * |
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:* | 2016.11.7 (including) | 2016.11.10 | * |
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:* | 2016.11.4 (including) | 2016.11.6 | * |
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:* | n/a | 2015.8.10 | * |
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:* | 2015.8.11 (including) | 2015.8.13 | * |
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:* | 2016.3.0 (including) | 2016.3.4 | * |
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:* | 2016.3.5 (including) | 2016.3.6 | * |
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:* | 2016.11.0 (including) | 2016.11.3 | * |
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* | n/a | n/a | 9.0 |
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* | n/a | n/a | 10.0 |