SaltStack Salt REST API Arbitrary Command Execution
Title source: metasploitDescription
An issue was discovered in SaltStack Salt through 3002. Sending crafted web requests to the Salt API, with the SSH client enabled, can result in shell injection.
Exploits (2)
Nuclei Templates (1)
SaltStack <=3002 - Shell Injection
CRITICALby dwisiswant0
References (15)
Scores
CVSS v3
9.8
EPSS
0.9439
EPSS Percentile
100.0%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lab Environment
Details
CISA KEV
2021-11-03
VulnCheck KEV
2021-04-24
InTheWild.io
2021-07-23
ENISA EUVD
EUVD-2020-0173
CWE
CWE-78
Status
published
Products (8)
debian/debian_linux
9.0
debian/debian_linux
10.0
fedoraproject/fedora
31
opensuse/leap
15.1
pypi/salt
0 - 2015.8.13PyPI
saltstack/salt
3001
saltstack/salt
3002
saltstack/salt
< 2015.8.10
Published
Nov 06, 2020
KEV Added
Nov 03, 2021
Tracked Since
Feb 18, 2026