CVE-2020-16846
Scores
EPSS Score
0.9439
CVSS
3.x 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
All CVSS Scores
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Description
Была обнаружена проблема в SaltStack Salt до 3002. Отправка специальным образом подготовленных веб-запросов к API Salt, с включенным SSH-клиентом, может привести к инъекции командной строки.
Sources
CWEs
Related Vulnerabilities
Exploits
Exploit ID: CVE-2020-16846
Source: github-poc
URL: https://github.com/zomy22/CVE-2020-16846-Saltstack-Salt-API
Vulnerable Software
Type: Configuration
Product: salt
Operating System: ubuntu bionic 18.04
{
"unfixed": true
}
Source: ubuntu
Type: Configuration
Product: salt
Operating System: ubuntu groovy 20.10
{
"unfixed": true
}
Source: ubuntu
Type: Configuration
Product: salt
Operating System: ubuntu hirsute 21.04
{
"unfixed": true
}
Source: ubuntu
Type: Configuration
Product: salt
Operating System: ubuntu impish 21.10
{
"unfixed": true
}
Source: ubuntu
Type: Configuration
Product: salt
Operating System: ubuntu jammy 22.04
{
"unaffected": true
}
Source: ubuntu
Type: Configuration
Product: salt
Operating System: ubuntu kinetic 22.10
{
"unfixed": true
}
Source: ubuntu
Type: Configuration
Product: salt
Operating System: ubuntu trusty 14.04
{
"unfixed": true
}
Source: ubuntu
Type: Configuration
Product: salt
Operating System: ubuntu xenial 16.04
{
"unfixed": true
}
Source: ubuntu
Type: Configuration
Product: salt
Operating System: debian
{
"fixed": "3002.1+dfsg1-1"
}
Source: debian
Type: Configuration
Vendor: debian
Product: debian_linux
Operating System: * * *
{
"cpe_match": [
{
"cpe23uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"vulnerable": true
},
{
"cpe23uri": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"vulnerable": true
}
],
"operator": "OR"
}
Source: nvd
Type: Configuration
Vendor: fedoraproject
Product: fedora
Operating System: * * *
{
"cpe_match": [
{
"cpe23uri": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"vulnerable": true
}
],
"operator": "OR"
}
Source: nvd
Type: Configuration
Vendor: saltstack
Product: salt
Operating System: * * *
{
"cpe_match": [
{
"cpe23uri": "cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2015.8.10",
"vulnerable": true
},
{
"cpe23uri": "cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2015.8.13",
"versionStartIncluding": "2015.8.11",
"vulnerable": true
},
{
"cpe23uri": "cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2016.3.4",
"versionStartIncluding": "2016.3.0",
"vulnerable": true
},
{
"cpe23uri": "cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2016.3.6",
"versionStartIncluding": "2016.3.5",
"vulnerable": true
},
{
"cpe23uri": "cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2016.3.8",
"versionStartIncluding": "2016.3.7",
"vulnerable": true
},
{
"cpe23uri": "cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2016.11.3",
"versionStartIncluding": "2016.11.0",
"vulnerable": true
},
{
"cpe23uri": "cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2016.11.6",
"versionStartIncluding": "2016.11.4",
"vulnerable": true
},
{
"cpe23uri": "cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2016.11.10",
"versionStartIncluding": "2016.11.7",
"vulnerable": true
},
{
"cpe23uri": "cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2017.7.4",
"versionStartIncluding": "2017.5.0",
"vulnerable": true
},
{
"cpe23uri": "cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2017.7.8",
"versionStartIncluding": "2017.7.5",
"vulnerable": true
},
{
"cpe23uri": "cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2018.3.5",
"versionStartIncluding": "2018.2.0",
"vulnerable": true
},
{
"cpe23uri": "cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2019.2.5",
"versionStartIncluding": "2019.2.0",
"vulnerable": true
},
{
"cpe23uri": "cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3000.3",
"versionStartIncluding": "3000.0",
"vulnerable": true
},
{
"cpe23uri": "cpe:2.3:a:saltstack:salt:3001:*:*:*:*:*:*:*",
"vulnerable": true
},
{
"cpe23uri": "cpe:2.3:a:saltstack:salt:3002:*:*:*:*:*:*:*",
"vulnerable": true
}
],
"operator": "OR"
}
Source: nvd