RULE(RULE ID:332445)

Rule General Information
Release Date: 2021-01-28
Rule Name: SaltStack Salt API SSH Client Command Injection Vulnerability (CVE-2020-16846)
Severity:
CVE ID:
Rule Protection Details
Description: An issue was discovered in SaltStack Salt through 3002. Sending crafted web requests to the Salt API, with the SSH client enabled, can result in shell injection.
Impact: An attacker can execute arbitrary command via a successful exploit in the context of the vulnerable software.
Affected OS: Windows, Linux, Others
Reference: http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00029.html
http://packetstormsecurity.com/files/160039/SaltStack-Salt-REST-API-Arbitrary-Command-Execution.html
https://github.com/saltstack/salt/releases
https://lists.debian.org/debian-lts-announce/2020/12/msg00007.html
Solutions
The vendors have released upgrade patches to fix vulnerabilities, please visit:
https://gitlab.com/saltstack/open/salt-patches/-/commit/a8b998ae07dbf752cbd6a1d1cdcdcc366bffb04e