First published: Fri Jan 17 2020(Updated: )
In SaltStack Salt before 2019.2.3, the salt-api NET API with the ssh client enabled is vulnerable to command injection. This allows an unauthenticated attacker with network access to the API endpoint to execute arbitrary code on the salt-api host.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/salt | <=2016.11.2+ds-1+deb9u2<=2018.3.4+dfsg1-7<=2018.3.4+dfsg1-6<=2016.11.2+ds-1 | 2019.2.3+dfsg1-1 2018.3.4+dfsg1-6+deb10u1 2016.11.2+ds-1+deb9u3 |
SaltStack Salt | <=2019.2.0 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
openSUSE Leap | =15.1 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
pip/salt | <2019.2.3 | 2019.2.3 |
debian/salt |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-17361 is a vulnerability in SaltStack Salt through 2019.2.0 that allows an unauthenticated attacker to execute arbitrary code on the salt-api host.
CVE-2019-17361 has a severity rating of 9.8 (critical).
SaltStack Salt versions 2019.2.0 and below are affected by CVE-2019-17361.
To fix CVE-2019-17361, upgrade to SaltStack Salt version 2019.2.3 or apply the relevant patches provided by the vendor.
You can find more information about CVE-2019-17361 in the official SaltStack documentation, SaltStack GitHub repository, and the opensuse-security-announce mailing list.