CVE-2019-17361Command Injection in Salt

CWE-77Command Injection10 documents7 sources
Severity
9.8CRITICALNVD
EPSS
18.5%
top 4.74%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 17
Latest updateMay 24

Description

In SaltStack Salt through 2019.2.0, the salt-api NET API with the ssh client enabled is vulnerable to command injection. This allows an unauthenticated attacker with network access to the API endpoint to execute arbitrary code on the salt-api host.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages3 packages

PyPIsaltstack/salt< 2019.2.3+1
NVDsaltstack/salt2019.2.0
NVDopensuse/leap15.1

Also affects: Debian Linux 10.0, 9.0, Ubuntu Linux 16.04, 18.04

Patches

🔴Vulnerability Details

5
GHSA
SaltStack Salt is vulnerable to command injection2022-05-24
OSV
SaltStack Salt is vulnerable to command injection2022-05-24
OSV
salt vulnerabilities2020-08-13
OSV
CVE-2019-17361: In SaltStack Salt through 20192020-01-17
CVEList
CVE-2019-17361: In SaltStack Salt through 20192020-01-17

📋Vendor Advisories

2
Ubuntu
Salt vulnerabilities2020-08-13
Red Hat
salt: salt-api NET API with the ssh client enabled is vulnerable to command injection2020-01-16

💬Community

2
Bugzilla
CVE-2019-17361 salt: salt-api NET API with the ssh client enabled is vulnerable to command injection [epel-all]2020-01-30
Bugzilla
CVE-2019-17361 salt: salt-api NET API with the ssh client enabled is vulnerable to command injection2020-01-30
CVE-2019-17361 — Command Injection in Saltstack Salt | cvebase