CVE-2020-16846

An issue was discovered in SaltStack Salt through 3002. Sending crafted web requests to the Salt API, with the SSH client enabled, can result in shell injection.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00029.html Mailing List Third Party Advisory
http://packetstormsecurity.com/files/160039/SaltStack-Salt-REST-API-Arbitrary-Command-Execution.html Exploit Third Party Advisory VDB Entry
https://github.com/saltstack/salt/releases Release Notes
https://lists.debian.org/debian-lts-announce/2020/12/msg00007.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2022/01/msg00000.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TPOGB2F6XUAIGFDTOCQDNB2VIXFXHWMA/ Release Notes
https://security.gentoo.org/glsa/202011-13 Third Party Advisory
https://www.debian.org/security/2021/dsa-4837 Mailing List Third Party Advisory
https://www.saltstack.com/blog/on-november-3-2020-saltstack-publicly-disclosed-three-new-cves/ Broken Link Vendor Advisory
https://www.zerodayinitiative.com/advisories/ZDI-20-1379/ Third Party Advisory VDB Entry
https://www.zerodayinitiative.com/advisories/ZDI-20-1380/ Third Party Advisory VDB Entry
https://www.zerodayinitiative.com/advisories/ZDI-20-1381/ Third Party Advisory VDB Entry
https://www.zerodayinitiative.com/advisories/ZDI-20-1382/ Third Party Advisory VDB Entry
https://www.zerodayinitiative.com/advisories/ZDI-20-1383/ Third Party Advisory VDB Entry
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00029.html Mailing List Third Party Advisory
http://packetstormsecurity.com/files/160039/SaltStack-Salt-REST-API-Arbitrary-Command-Execution.html Exploit Third Party Advisory VDB Entry
https://github.com/saltstack/salt/releases Release Notes
https://lists.debian.org/debian-lts-announce/2020/12/msg00007.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2022/01/msg00000.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TPOGB2F6XUAIGFDTOCQDNB2VIXFXHWMA/ Release Notes
https://security.gentoo.org/glsa/202011-13 Third Party Advisory
https://www.debian.org/security/2021/dsa-4837 Mailing List Third Party Advisory
https://www.saltstack.com/blog/on-november-3-2020-saltstack-publicly-disclosed-three-new-cves/ Broken Link Vendor Advisory
https://www.zerodayinitiative.com/advisories/ZDI-20-1379/ Third Party Advisory VDB Entry
https://www.zerodayinitiative.com/advisories/ZDI-20-1380/ Third Party Advisory VDB Entry
https://www.zerodayinitiative.com/advisories/ZDI-20-1381/ Third Party Advisory VDB Entry
https://www.zerodayinitiative.com/advisories/ZDI-20-1382/ Third Party Advisory VDB Entry
https://www.zerodayinitiative.com/advisories/ZDI-20-1383/ Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*
cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*
cpe:2.3:a:saltstack:salt:3001:*:*:*:*:*:*:*
cpe:2.3:a:saltstack:salt:3002:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*

History

06 Feb 2025, 14:51

Type Values Removed Values Added
First Time Opensuse leap
Opensuse
CPE cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*

Information

Published : 2020-11-06 08:15

Updated : 2025-03-14 17:28


NVD link : CVE-2020-16846

Mitre link : CVE-2020-16846

CVE.ORG link : CVE-2020-16846


JSON object : View

Products Affected

saltstack

  • salt

debian

  • debian_linux

fedoraproject

  • fedora

opensuse

  • leap
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')