CVE-2020-16846

EUVD-2020-0173
An issue was discovered in SaltStack Salt through 3002. Sending crafted web requests to the Salt API, with the SSH client enabled, can result in shell injection.
OS Command Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
9.8 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA-ADPADP
9.8 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 99%
Affected Products (NVD)
VendorProductVersion
saltstacksalt
𝑥
< 2015.8.10
saltstacksalt
2015.8.11 ≤
𝑥
< 2015.8.13
saltstacksalt
2016.3.0 ≤
𝑥
< 2016.3.4
saltstacksalt
2016.3.5 ≤
𝑥
< 2016.3.6
saltstacksalt
2016.3.7 ≤
𝑥
< 2016.3.8
saltstacksalt
2016.11.0 ≤
𝑥
< 2016.11.3
saltstacksalt
2016.11.4 ≤
𝑥
< 2016.11.6
saltstacksalt
2016.11.7 ≤
𝑥
< 2016.11.10
saltstacksalt
2017.5.0 ≤
𝑥
< 2017.7.4
saltstacksalt
2017.7.5 ≤
𝑥
< 2017.7.8
saltstacksalt
2018.2.0 ≤
𝑥
< 2018.3.5
saltstacksalt
2019.2.0 ≤
𝑥
< 2019.2.5
saltstacksalt
3000.0 ≤
𝑥
< 3000.3
debiandebian_linux
9.0
debiandebian_linux
10.0
opensuseleap
15.1
𝑥
= Vulnerable software versions
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
salt
bionic
Fixed 2017.7.4+dfsg1-1ubuntu18.04.2+esm1
released
focal
dne
groovy
ignored
hirsute
ignored
impish
ignored
jammy
needs-triage
kinetic
ignored
lunar
dne
mantic
dne
noble
dne
trusty
needs-triage
xenial
Fixed 2015.8.8+ds-1ubuntu0.1+esm2
released
References