An issue was discovered in SaltStack Salt before 3002.5. The salt-apis ssh client is vulnerable to a shell injection by including ProxyCommand in an argument, or via ssh_options provided in an API request.
The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Salt | Saltstack | * | 2015.8.10 (excluding) |
Salt | Saltstack | 2015.8.11 (including) | 2015.8.13 (excluding) |
Salt | Saltstack | 2016.3.0 (including) | 2016.3.4 (excluding) |
Salt | Saltstack | 2016.3.5 (including) | 2016.3.6 (excluding) |
Salt | Saltstack | 2016.3.7 (including) | 2016.3.8 (excluding) |
Salt | Saltstack | 2016.3.9 (including) | 2016.11.3 (excluding) |
Salt | Saltstack | 2016.11.4 (including) | 2016.11.5 (excluding) |
Salt | Saltstack | 2016.11.7 (including) | 2016.11.10 (excluding) |
Salt | Saltstack | 2017.5.0 (including) | 2017.7.8 (excluding) |
Salt | Saltstack | 2018.2.0 (including) | 2018.3.5 (including) |
Salt | Saltstack | 2019.2.0 (including) | 2019.2.5 (excluding) |
Salt | Saltstack | 2019.2.6 (including) | 2019.2.8 (excluding) |
Salt | Saltstack | 3000 (including) | 3000.6 (excluding) |
Salt | Saltstack | 3001 (including) | 3001.4 (excluding) |
Salt | Saltstack | 3002 (including) | 3002.5 (excluding) |
Salt | Ubuntu | bionic | * |
Salt | Ubuntu | esm-apps/bionic | * |
Salt | Ubuntu | esm-apps/xenial | * |
Salt | Ubuntu | groovy | * |
Salt | Ubuntu | hirsute | * |
Salt | Ubuntu | impish | * |
Salt | Ubuntu | kinetic | * |
Salt | Ubuntu | trusty | * |
Salt | Ubuntu | xenial | * |