An issue was discovered in SaltStack Salt through 3002. Sending crafted web requests to the Salt API, with the SSH client enabled, can result in shell injection.
Metrics
Affected Vendors & Products
References
History
Fri, 07 Feb 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
kev
|
Thu, 06 Feb 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Opensuse
Opensuse leap |
|
CPEs | cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:* | |
Vendors & Products |
Opensuse
Opensuse leap |
Wed, 14 Aug 2024 00:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-02-07T13:57:33.897Z
Reserved: 2020-08-04T00:00:00.000Z
Link: CVE-2020-16846

Updated: 2024-08-04T13:45:33.237Z

Status : Modified
Published: 2020-11-06T08:15:13.283
Modified: 2025-02-07T14:15:47.457
Link: CVE-2020-16846
