ghsa-qr38-h96j-2j3w
Vulnerability from github
Published
2022-05-24 17:33
Modified
2024-07-26 21:47
Severity
Summary
SaltStack Salt Command Injection in netapi ssh client
Details
An issue was discovered in SaltStack Salt through 3002. Sending crafted web requests to the Salt API, with the SSH client enabled, can result in shell injection.
{ "affected": [ { "package": { "ecosystem": "PyPI", "name": "salt" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "2015.8.13" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "PyPI", "name": "salt" }, "ranges": [ { "events": [ { "introduced": "2016.3.0" }, { "fixed": "2016.3.8" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "PyPI", "name": "salt" }, "ranges": [ { "events": [ { "introduced": "2016.11.0" }, { "fixed": "2016.11.10" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "PyPI", "name": "salt" }, "ranges": [ { "events": [ { "introduced": "2017.5.0" }, { "fixed": "2017.7.8" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "PyPI", "name": "salt" }, "ranges": [ { "events": [ { "introduced": "2018.2.0" }, { "fixed": "2018.3.5" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "PyPI", "name": "salt" }, "ranges": [ { "events": [ { "introduced": "2019.2.0" }, { "fixed": "2019.2.6" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "PyPI", "name": "salt" }, "ranges": [ { "events": [ { "introduced": "3000.0" }, { "fixed": "3000.4" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "PyPI", "name": "salt" }, "ranges": [ { "events": [ { "introduced": "3001" }, { "fixed": "3001.2" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "PyPI", "name": "salt" }, "ranges": [ { "events": [ { "introduced": "3002" }, { "fixed": "3002.1" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2020-16846" ], "database_specific": { "cwe_ids": [ "CWE-78" ], "github_reviewed": true, "github_reviewed_at": "2024-04-22T22:23:42Z", "nvd_published_at": "2020-11-06T08:15:00Z", "severity": "CRITICAL" }, "details": "An issue was discovered in SaltStack Salt through 3002. Sending crafted web requests to the Salt API, with the SSH client enabled, can result in shell injection.", "id": "GHSA-qr38-h96j-2j3w", "modified": "2024-07-26T21:47:09Z", "published": "2022-05-24T17:33:18Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16846" }, { "type": "WEB", "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1383" }, { "type": "WEB", "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1382" }, { "type": "WEB", "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1381" }, { "type": "WEB", "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1380" }, { "type": "WEB", "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1379" }, { "type": "WEB", "url": "https://www.saltstack.com/blog/on-november-3-2020-saltstack-publicly-disclosed-three-new-cves" }, { "type": "WEB", "url": "https://www.debian.org/security/2021/dsa-4837" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/202011-13" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TPOGB2F6XUAIGFDTOCQDNB2VIXFXHWMA" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TPOGB2F6XUAIGFDTOCQDNB2VIXFXHWMA" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2022/01/msg00000.html" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00007.html" }, { "type": "WEB", "url": "https://github.com/saltstack/salt/releases" }, { "type": "WEB", "url": "https://github.com/saltstack/salt/blob/8f9405cf8e6f7d7776d5000841c886dec6d96250/doc/topics/releases/3002.1.rst#L12" }, { "type": "WEB", "url": "https://github.com/saltstack/salt/blob/8f9405cf8e6f7d7776d5000841c886dec6d96250/doc/topics/releases/3001.2.rst#L10" }, { "type": "WEB", "url": "https://github.com/saltstack/salt/blob/8f9405cf8e6f7d7776d5000841c886dec6d96250/doc/topics/releases/3000.4.rst#L10" }, { "type": "WEB", "url": "https://github.com/saltstack/salt/blob/8f9405cf8e6f7d7776d5000841c886dec6d96250/doc/topics/releases/2019.2.6.rst#L10" }, { "type": "PACKAGE", "url": "https://github.com/saltstack/salt" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00029.html" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/160039/SaltStack-Salt-REST-API-Arbitrary-Command-Execution.html" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ], "summary": "SaltStack Salt Command Injection in netapi ssh client" }
Loading...