Vulnerability Details : CVE-2019-17361
In SaltStack Salt through 2019.2.0, the salt-api NET API with the ssh client enabled is vulnerable to command injection. This allows an unauthenticated attacker with network access to the API endpoint to execute arbitrary code on the salt-api host.
Vulnerability category: Execute code
Products affected by CVE-2019-17361
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
- cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
- cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2019-17361
13.56%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 94 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2019-17361
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST | |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2019-17361
-
The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.Assigned by: nvd@nist.gov (Primary)
References for CVE-2019-17361
-
https://www.debian.org/security/2020/dsa-4676
Debian -- Security Information -- DSA-4676-1 saltThird Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00026.html
[security-announce] openSUSE-SU-2020:0357-1: moderate: Security update fMailing List;Third Party Advisory
-
https://docs.saltstack.com/en/latest/topics/releases/2019.2.3.html#security-fix
Salt 2019.2.3 Release NotesRelease Notes;Third Party Advisory
-
https://github.com/saltstack/salt/commits/master
Commits · saltstack/salt · GitHubPatch;Third Party Advisory
-
https://usn.ubuntu.com/4459-1/
USN-4459-1: Salt vulnerabilities | Ubuntu security notices | UbuntuThird Party Advisory
Jump to