CVE Vulnerabilities

CVE-2021-3197

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

Published: Feb 27, 2021 | Modified: Dec 21, 2023
CVSS 3.x
9.8
CRITICAL
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
7.5 HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
Ubuntu

An issue was discovered in SaltStack Salt before 3002.5. The salt-apis ssh client is vulnerable to a shell injection by including ProxyCommand in an argument, or via ssh_options provided in an API request.

Weakness

The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.

Affected Software

Name Vendor Start Version End Version
Salt Saltstack * 2015.8.10 (excluding)
Salt Saltstack 2015.8.11 (including) 2015.8.13 (excluding)
Salt Saltstack 2016.3.0 (including) 2016.3.4 (excluding)
Salt Saltstack 2016.3.5 (including) 2016.3.6 (excluding)
Salt Saltstack 2016.3.7 (including) 2016.3.8 (excluding)
Salt Saltstack 2016.3.9 (including) 2016.11.3 (excluding)
Salt Saltstack 2016.11.4 (including) 2016.11.5 (excluding)
Salt Saltstack 2016.11.7 (including) 2016.11.10 (excluding)
Salt Saltstack 2017.5.0 (including) 2017.7.8 (excluding)
Salt Saltstack 2018.2.0 (including) 2018.3.5 (including)
Salt Saltstack 2019.2.0 (including) 2019.2.5 (excluding)
Salt Saltstack 2019.2.6 (including) 2019.2.8 (excluding)
Salt Saltstack 3000 (including) 3000.6 (excluding)
Salt Saltstack 3001 (including) 3001.4 (excluding)
Salt Saltstack 3002 (including) 3002.5 (excluding)

Potential Mitigations

References