This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: SaltStack Salt API suffers from **OS Command Injection**. π **Consequences**: Attackers bypass restrictions to **escalate privileges** and execute arbitrary commands via the SSH client feature.
Q2Root Cause? (CWE/Flaw)
π‘οΈ **Root Cause**: Improper validation in the Salt API when handling SSH client requests. β οΈ **Flaw**: Allows shell injection payloads to be executed on the host running the Salt-API.
Q3Who is affected? (Versions/Components)
π¦ **Affected**: SaltStack Salt versions **through 3002**. π₯οΈ **Component**: The Salt API service specifically. π **Published**: Nov 6, 2020.
Q4What can hackers do? (Privileges/Data)
π **Capabilities**: Run arbitrary OS commands. π **Privileges**: Escalate privileges by bypassing existing restrictions. π **Data**: Potential full system compromise via the Salt-API user context.
Q5Is exploitation threshold high? (Auth/Config)
π **Auth**: Requires **network access** to the Salt API. πͺ **Threshold**: Moderate. Unauthenticated users with network reach can exploit it if SSH client is enabled.
Q6Is there a public Exp? (PoC/Wild Exploitation)
π₯ **Exploit**: Yes. Public PoCs exist on GitHub (e.g., `zomy22/CVE-2020-16846`). π **Wild Exploitation**: Detected by scanners like Nuclei. Active exploitation is feasible.
Q7How to self-check? (Features/Scanning)
π **Check**: Scan for Salt API endpoints. π§ͺ **Test**: Send crafted web requests with SSH client enabled. π‘ **Tools**: Use Nuclei templates (`CVE-2020-16846.yaml`) for automated detection.
π§ **Workaround**: Disable the **SSH client** feature in the Salt API configuration if upgrading is not immediately possible. π **Mitigate**: Restrict network access to the Salt API port.
Q10Is it urgent? (Priority Suggestion)
β‘ **Urgency**: **HIGH**. Critical command injection allowing privilege escalation. π **Action**: Patch immediately or apply strict network controls. Do not ignore!