SaltStack.Salt.API.SSH.Client.Command.Injection
Description
This indicates an attack attempt to exploit an Command Injection Vulnerability in SaltStack Salt.
The vulnerability is due to improper sanitization of user specified SSH options. A remote, unauthenticated attacker can exploit this vulnerability by sending a crafted request to the rest_cherrypy web service. Successful exploitation can result in arbitrary code execution in the context of the root user.
Affected Products
SaltStack Salt 2015.x
SaltStack Salt 2016.x
SaltStack Salt 2017.x
SaltStack Salt 2018.x
SaltStack Salt 2019.x
SaltStack Salt 3000.x
SaltStack Salt 3001.x
SaltStack Salt 3002.x
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://www.saltstack.com/blog/on-november-3-2020-saltstack-publicly-disclosed-three-new-cves/
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |
Version Updates
Date | Version | Detail |
---|---|---|
2024-03-11 | 27.746 | Sig Added |
2024-02-13 | 26.732 | Sig Added |
2021-04-22 | 18.064 | Sig Added |
2021-01-27 | 17.006 | Sig Added |
2021-01-11 | 16.995 | Sig Added |
2020-12-08 | 16.975 | Default_action:pass:drop |
2020-11-30 | 16.970 |