CVE-2019-17361

In SaltStack Salt through 2019.2.0, the salt-api NET API with the ssh client enabled is vulnerable to command injection. This allows an unauthenticated attacker with network access to the API endpoint to execute arbitrary code on the salt-api host.
Configurations

Configuration 1 (hide)

cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*

History

31 Jan 2023, 21:03

Type Values Removed Values Added
First Time Canonical
Canonical ubuntu Linux
References (UBUNTU) https://usn.ubuntu.com/4459-1/ - (UBUNTU) https://usn.ubuntu.com/4459-1/ - Third Party Advisory
CPE cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*

Information

Published : 2020-01-17 02:15

Updated : 2023-12-10 13:13


NVD link : CVE-2019-17361

Mitre link : CVE-2019-17361

CVE.ORG link : CVE-2019-17361


JSON object : View

Products Affected

debian

  • debian_linux

saltstack

  • salt

opensuse

  • leap

canonical

  • ubuntu_linux
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')