CVE-2020-16846

An issue was discovered in SaltStack Salt through 3002. Sending crafted web requests to the Salt API, with the SSH client enabled, can result in shell injection.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00029.html Mailing List Third Party Advisory
http://packetstormsecurity.com/files/160039/SaltStack-Salt-REST-API-Arbitrary-Command-Execution.html Exploit Third Party Advisory VDB Entry
https://github.com/saltstack/salt/releases Release Notes
https://lists.debian.org/debian-lts-announce/2020/12/msg00007.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2022/01/msg00000.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TPOGB2F6XUAIGFDTOCQDNB2VIXFXHWMA/ Release Notes
https://security.gentoo.org/glsa/202011-13 Third Party Advisory
https://www.debian.org/security/2021/dsa-4837 Mailing List Third Party Advisory
https://www.saltstack.com/blog/on-november-3-2020-saltstack-publicly-disclosed-three-new-cves/ Broken Link Vendor Advisory
https://www.zerodayinitiative.com/advisories/ZDI-20-1379/ Third Party Advisory VDB Entry
https://www.zerodayinitiative.com/advisories/ZDI-20-1380/ Third Party Advisory VDB Entry
https://www.zerodayinitiative.com/advisories/ZDI-20-1381/ Third Party Advisory VDB Entry
https://www.zerodayinitiative.com/advisories/ZDI-20-1382/ Third Party Advisory VDB Entry
https://www.zerodayinitiative.com/advisories/ZDI-20-1383/ Third Party Advisory VDB Entry
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00029.html Mailing List Third Party Advisory
http://packetstormsecurity.com/files/160039/SaltStack-Salt-REST-API-Arbitrary-Command-Execution.html Exploit Third Party Advisory VDB Entry
https://github.com/saltstack/salt/releases Release Notes
https://lists.debian.org/debian-lts-announce/2020/12/msg00007.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2022/01/msg00000.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TPOGB2F6XUAIGFDTOCQDNB2VIXFXHWMA/ Release Notes
https://security.gentoo.org/glsa/202011-13 Third Party Advisory
https://www.debian.org/security/2021/dsa-4837 Mailing List Third Party Advisory
https://www.saltstack.com/blog/on-november-3-2020-saltstack-publicly-disclosed-three-new-cves/ Broken Link Vendor Advisory
https://www.zerodayinitiative.com/advisories/ZDI-20-1379/ Third Party Advisory VDB Entry
https://www.zerodayinitiative.com/advisories/ZDI-20-1380/ Third Party Advisory VDB Entry
https://www.zerodayinitiative.com/advisories/ZDI-20-1381/ Third Party Advisory VDB Entry
https://www.zerodayinitiative.com/advisories/ZDI-20-1382/ Third Party Advisory VDB Entry
https://www.zerodayinitiative.com/advisories/ZDI-20-1383/ Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*
cpe:2.3:a:saltstack:salt:3001:*:*:*:*:*:*:*
cpe:2.3:a:saltstack:salt:3002:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*

History

06 Feb 2025, 14:51

Type Values Removed Values Added
First Time Opensuse
Opensuse leap
CPE cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*

21 Nov 2024, 05:07

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00029.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00029.html - Mailing List, Third Party Advisory
References () http://packetstormsecurity.com/files/160039/SaltStack-Salt-REST-API-Arbitrary-Command-Execution.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/160039/SaltStack-Salt-REST-API-Arbitrary-Command-Execution.html - Exploit, Third Party Advisory, VDB Entry
References () https://github.com/saltstack/salt/releases - Release Notes () https://github.com/saltstack/salt/releases - Release Notes
References () https://lists.debian.org/debian-lts-announce/2020/12/msg00007.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2020/12/msg00007.html - Mailing List, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2022/01/msg00000.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2022/01/msg00000.html - Mailing List, Third Party Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TPOGB2F6XUAIGFDTOCQDNB2VIXFXHWMA/ - Release Notes () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TPOGB2F6XUAIGFDTOCQDNB2VIXFXHWMA/ - Release Notes
References () https://security.gentoo.org/glsa/202011-13 - Third Party Advisory () https://security.gentoo.org/glsa/202011-13 - Third Party Advisory
References () https://www.debian.org/security/2021/dsa-4837 - Mailing List, Third Party Advisory () https://www.debian.org/security/2021/dsa-4837 - Mailing List, Third Party Advisory
References () https://www.saltstack.com/blog/on-november-3-2020-saltstack-publicly-disclosed-three-new-cves/ - Broken Link, Vendor Advisory () https://www.saltstack.com/blog/on-november-3-2020-saltstack-publicly-disclosed-three-new-cves/ - Broken Link, Vendor Advisory
References () https://www.zerodayinitiative.com/advisories/ZDI-20-1379/ - Third Party Advisory, VDB Entry () https://www.zerodayinitiative.com/advisories/ZDI-20-1379/ - Third Party Advisory, VDB Entry
References () https://www.zerodayinitiative.com/advisories/ZDI-20-1380/ - Third Party Advisory, VDB Entry () https://www.zerodayinitiative.com/advisories/ZDI-20-1380/ - Third Party Advisory, VDB Entry
References () https://www.zerodayinitiative.com/advisories/ZDI-20-1381/ - Third Party Advisory, VDB Entry () https://www.zerodayinitiative.com/advisories/ZDI-20-1381/ - Third Party Advisory, VDB Entry
References () https://www.zerodayinitiative.com/advisories/ZDI-20-1382/ - Third Party Advisory, VDB Entry () https://www.zerodayinitiative.com/advisories/ZDI-20-1382/ - Third Party Advisory, VDB Entry
References () https://www.zerodayinitiative.com/advisories/ZDI-20-1383/ - Third Party Advisory, VDB Entry () https://www.zerodayinitiative.com/advisories/ZDI-20-1383/ - Third Party Advisory, VDB Entry

26 Jul 2024, 19:53

Type Values Removed Values Added
CPE cpe:2.3:a:saltstack:salt:3002:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
First Time Fedoraproject
Fedoraproject fedora
References () http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00029.html - Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00029.html - Mailing List, Third Party Advisory
References () http://packetstormsecurity.com/files/160039/SaltStack-Salt-REST-API-Arbitrary-Command-Execution.html - Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/160039/SaltStack-Salt-REST-API-Arbitrary-Command-Execution.html - Exploit, Third Party Advisory, VDB Entry
References () https://github.com/saltstack/salt/releases - Third Party Advisory () https://github.com/saltstack/salt/releases - Release Notes
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TPOGB2F6XUAIGFDTOCQDNB2VIXFXHWMA/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TPOGB2F6XUAIGFDTOCQDNB2VIXFXHWMA/ - Release Notes
References () https://www.debian.org/security/2021/dsa-4837 - Third Party Advisory () https://www.debian.org/security/2021/dsa-4837 - Mailing List, Third Party Advisory
References () https://www.saltstack.com/blog/on-november-3-2020-saltstack-publicly-disclosed-three-new-cves/ - Vendor Advisory () https://www.saltstack.com/blog/on-november-3-2020-saltstack-publicly-disclosed-three-new-cves/ - Broken Link, Vendor Advisory

07 Nov 2023, 03:19

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TPOGB2F6XUAIGFDTOCQDNB2VIXFXHWMA/', 'name': 'FEDORA-2020-9e040bd6dd', 'tags': ['Third Party Advisory'], 'refsource': 'FEDORA'}
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TPOGB2F6XUAIGFDTOCQDNB2VIXFXHWMA/ -

Information

Published : 2020-11-06 08:15

Updated : 2025-03-14 17:28


NVD link : CVE-2020-16846

Mitre link : CVE-2020-16846

CVE.ORG link : CVE-2020-16846


JSON object : View

Products Affected

debian

  • debian_linux

opensuse

  • leap

fedoraproject

  • fedora

saltstack

  • salt
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')