Discover the critical security vulnerability in SaltStack Salt up to 2019.2.0 allowing unauthenticated attackers to execute arbitrary code. Learn about the impact, affected systems, exploitation, and mitigation steps.
SaltStack Salt up to version 2019.2.0 is vulnerable to a critical security issue that allows unauthenticated attackers to execute arbitrary code on the host running salt-api when the ssh client is enabled.
Understanding CVE-2019-17361
This CVE identifies a vulnerability in SaltStack Salt versions up to 2019.2.0, specifically affecting the salt-api NET API when the ssh client feature is active.
What is CVE-2019-17361?
SaltStack Salt through version 2019.2.0 is susceptible to command injection via the salt-api NET API with the ssh client enabled. This flaw enables unauthorized attackers with network access to the API endpoint to run malicious code on the salt-api host.
The Impact of CVE-2019-17361
The vulnerability allows unauthenticated attackers with network access to the API endpoint to execute any code on the host where salt-api is running, potentially leading to a complete compromise of the system.
Technical Details of CVE-2019-17361
SaltStack Salt up to version 2019.2.0 is affected by a critical security issue that can be exploited by attackers to execute arbitrary code.
Vulnerability Description
The vulnerability lies in the salt-api NET API when the ssh client is enabled, allowing attackers to perform command injection and execute malicious code on the host.
Affected Systems and Versions
Exploitation Mechanism
Attackers, without authentication, can leverage network access to the API endpoint to execute arbitrary code on the host running salt-api.
Mitigation and Prevention
To address CVE-2019-17361, immediate actions and long-term security practices are crucial.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates