CVE-2020-16846

NameCVE-2020-16846
DescriptionAn issue was discovered in SaltStack Salt through 3002. Sending crafted web requests to the Salt API, with the SSH client enabled, can result in shell injection.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-2480-1, DSA-4837-1, ELA-537-1
NVD severityhigh

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
salt (PTS)jessie, jessie (lts)2014.1.13+ds-3+deb8u2fixed
stretch2016.11.2+ds-1+deb9u4vulnerable
stretch (security)2016.11.2+ds-1+deb9u10fixed
buster2018.3.4+dfsg1-6+deb10u2fixed
buster (security)2018.3.4+dfsg1-6+deb10u3fixed
bullseye (security), bullseye3002.6+dfsg1-4+deb11u1fixed
sid, bookworm3004+dfsg1-6fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
saltsourcejessie2014.1.13+ds-3+deb8u2ELA-537-1
saltsourcestretch2016.11.2+ds-1+deb9u6DLA-2480-1
saltsourcebuster2018.3.4+dfsg1-6+deb10u2DSA-4837-1
saltsource(unstable)3002.1+dfsg1-1

Notes

https://www.saltstack.com/blog/on-november-3-2020-saltstack-publicly-disclosed-three-new-cves/
https://gitlab.com/saltstack/open/salt-patches/tree/master/patches/2020/09/02/
Regression: https://github.com/saltstack/salt/issues/58970
Regression fix: https://github.com/saltstack/salt/commit/84d91931865626a9b53558f88d6c8919a270df3a (v3000.6)

Search for package or bug name: Reporting problems