CVE-2020-16846

An issue was discovered in SaltStack Salt through 3002. Sending crafted web requests to the Salt API, with the SSH client enabled, can result in shell injection.
OS Command Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
9.8 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
mitreCNA
---
---
CVEADP
---
---
CISA-ADPADP
9.8 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 99%
VendorProductVersion
saltstacksalt
𝑥
< 2015.8.10
saltstacksalt
2015.8.11 ≤
𝑥
< 2015.8.13
saltstacksalt
2016.3.0 ≤
𝑥
< 2016.3.4
saltstacksalt
2016.3.5 ≤
𝑥
< 2016.3.6
saltstacksalt
2016.3.7 ≤
𝑥
< 2016.3.8
saltstacksalt
2016.11.0 ≤
𝑥
< 2016.11.3
saltstacksalt
2016.11.4 ≤
𝑥
< 2016.11.6
saltstacksalt
2016.11.7 ≤
𝑥
< 2016.11.10
saltstacksalt
2017.5.0 ≤
𝑥
< 2017.7.4
saltstacksalt
2017.7.5 ≤
𝑥
< 2017.7.8
saltstacksalt
2018.2.0 ≤
𝑥
< 2018.3.5
saltstacksalt
2019.2.0 ≤
𝑥
< 2019.2.5
saltstacksalt
3000.0 ≤
𝑥
< 3000.3
debiandebian_linux
9.0
debiandebian_linux
10.0
opensuseleap
15.1
𝑥
= Vulnerable software versions
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
salt
noble
dne
mantic
dne
lunar
dne
kinetic
ignored
jammy
needs-triage
impish
ignored
hirsute
ignored
groovy
ignored
focal
dne
bionic
Fixed 2017.7.4+dfsg1-1ubuntu18.04.2+esm1
released
xenial
Fixed 2015.8.8+ds-1ubuntu0.1+esm2
released
trusty
needs-triage
References