Name | CVE-2019-17361 |
Description | In SaltStack Salt through 2019.2.0, the salt-api NET API with the ssh client enabled is vulnerable to command injection. This allows an unauthenticated attacker with network access to the API endpoint to execute arbitrary code on the salt-api host. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DSA-4676-1 |
Debian Bugs | 949222 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
salt (PTS) | jessie, jessie (lts) | 2014.1.13+ds-3+deb8u2 | fixed |
| stretch (security), stretch (lts), stretch | 2016.11.2+ds-1+deb9u10 | fixed |
| buster (security), buster, buster (lts) | 2018.3.4+dfsg1-6+deb10u3 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
salt | source | jessie | (not affected) | | | |
salt | source | stretch | 2016.11.2+ds-1+deb9u3 | | DSA-4676-1 | |
salt | source | buster | 2018.3.4+dfsg1-6+deb10u1 | | DSA-4676-1 | |
salt | source | (unstable) | 2019.2.3+dfsg1-1 | | | 949222 |
Notes
[jessie] - salt <not-affected> (Vulnerable code added in v2014.7)
https://github.com/saltstack/salt/commit/bca115f3f00fbde564dd2f12bf036b5d2fd08387
Vulnerability introduced in https://github.com/saltstack/salt/commit/3bade9d6258fb8df849b32f68de6343cfdd83720