7.5
CVSSv2

CVE-2020-16846

Published: 06/11/2020 Updated: 07/11/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

An issue exists in SaltStack Salt up to and including 3002. Sending crafted web requests to the Salt API, with the SSH client enabled, can result in shell injection.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

saltstack salt 3001

saltstack salt

debian debian linux 9.0

debian debian linux 10.0

Vendor Advisories

Several vulnerabilities were discovered in salt, a powerful remote execution manager The flaws could result in authentication bypass and invocation of Salt SSH, creation of certificates with weak file permissions via the TLS execution module or shell injections with the Salt API using the SSH client For the stable distribution (buster), these pro ...
An issue has been found in Salt before 30013, 30005, 201927 where an unauthenticated user with network access to the Salt API can use shell injections to run code on the Salt API using the SSH client ...

Exploits

This Metasploit module exploits an authentication bypass and command injection in SaltStack Salt's REST API to execute commands as the root user The following versions have received a patch: 2015810, 2015813, 201634, 201636, 201638, 2016113, 2016116, 20161110, 201774, 201778, 201835, 201925, 201926, 30003, 30004, 30011 ...

Github Repositories

CVE-2020-16846-Saltstack-Salt-API Vulnerability Explained: An issue was discovered in SaltStack Salt through 3002 Sending crafted web requests to the Salt API, with the SSH client enabled, can result in shell injection The details about this vulnerability can be found here: wwwzerodayinitiativecom/blog/2020/11/24/detailing-saltstack-salt-command-injection-vulnerabil

CVE-2020-16846 실습 요약 Salt는 동적 통신 버스를 기반으로 구축된 인프라 관리에 대한 새로운 접근 방식임 2020년 11월 SaltStack은 CVE-2020-16846 및 CVE-2020-25592라는 두 가지 취약점을 공식적으로 공개했음 CVE-2020-25592는 임의의 사용자가 SSH 모듈을 사용할 수 있도록 허용함 CVE-2020-16846은 사용자가

Recent Articles

Automation software slinger SaltStack warns of stop-watching-the-election-and-patch-now bugs
The Register • Simon Sharwood, APAC Editor • 04 Nov 2020

Fixes look to have landed in GitHub well ahead of disclosure

SaltStack has officially revealed three bugs in its code – two of them seemingly critical – and told users: “We strongly recommend that you prioritize this update.” But the biz appears to have known about the bugs for months and quietly patched them over the summer. SaltStack offers open-source, Python-based automation tools. It was acquired by VMware in October, and Virtzilla hailed the deal as completing and extending its automation offerings and to help it provide a full-stack offerin...