CVE-2020-16846

NameCVE-2020-16846
DescriptionAn issue was discovered in SaltStack Salt through 3002. Sending crafted web requests to the Salt API, with the SSH client enabled, can result in shell injection.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-2480-1, DSA-4837-1, ELA-537-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
salt (PTS)jessie, jessie (lts)2014.1.13+ds-3+deb8u2fixed
stretch (security), stretch (lts), stretch2016.11.2+ds-1+deb9u10fixed
buster, buster (security)2018.3.4+dfsg1-6+deb10u3fixed
bullseye (security), bullseye3002.6+dfsg1-4+deb11u1fixed
sid3004.1+dfsg-2.2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
saltsourcejessie2014.1.13+ds-3+deb8u2ELA-537-1
saltsourcestretch2016.11.2+ds-1+deb9u6DLA-2480-1
saltsourcebuster2018.3.4+dfsg1-6+deb10u2DSA-4837-1
saltsource(unstable)3002.1+dfsg1-1

Notes

https://www.saltstack.com/blog/on-november-3-2020-saltstack-publicly-disclosed-three-new-cves/
https://gitlab.com/saltstack/open/salt-patches/tree/master/patches/2020/09/02/
Regression: https://github.com/saltstack/salt/issues/58970
Regression fix: https://github.com/saltstack/salt/commit/84d91931865626a9b53558f88d6c8919a270df3a (v3000.6)

Search for package or bug name: Reporting problems