CVE-2020-16846
An issue was discovered in SaltStack Salt through 3002. Sending crafted web requests to the Salt API, with the SSH client enabled, can result in shell injection.
Package Versions Affected
Automatically patch vulnerabilities without upgrading
CVSS Version



Related Resources
References
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-16846, http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00029.html, http://packetstormsecurity.com/files/160039/SaltStack-Salt-REST-API-Arbitrary-Command-Execution.html, https://github.com/saltstack/salt/releases, https://lists.debian.org/debian-lts-announce/2020/12/msg00007.html, https://lists.debian.org/debian-lts-announce/2022/01/msg00000.html, https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TPOGB2F6XUAIGFDTOCQDNB2VIXFXHWMA/, https://security.gentoo.org/glsa/202011-13, https://www.debian.org/security/2021/dsa-4837, https://www.saltstack.com/blog/on-november-3-2020-saltstack-publicly-disclosed-three-new-cves/, https://www.zerodayinitiative.com/advisories/ZDI-20-1379/, https://www.zerodayinitiative.com/advisories/ZDI-20-1380/, https://www.zerodayinitiative.com/advisories/ZDI-20-1381/, https://www.zerodayinitiative.com/advisories/ZDI-20-1382/, https://www.zerodayinitiative.com/advisories/ZDI-20-1383/
