CVE-2019-17361
Description
In SaltStack Salt through 2019.2.0, the salt-api NET API with the ssh client enabled is vulnerable to command injection. This allows an unauthenticated attacker with network access to the API endpoint to execute arbitrary code on the salt-api host.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
An unauthenticated command injection in Salt's salt-api NET SSH endpoint allows arbitrary code execution on the host, fixed in later releases.
Vulnerability
Overview
CVE-2019-17361 is a command injection vulnerability in the salt-api NET API of SaltStack Salt, affecting versions through 2019.2.0. The flaw exists when the SSH client is enabled; the API endpoint fails to properly sanitize user-supplied input, allowing an attacker to inject arbitrary operating system commands. [1] [2]
Exploitation
Prerequisites
The vulnerability can be exploited remotely without authentication, provided the attacker has network access to the salt-api endpoint. No prior credentials or special privileges are required. The attacker only needs to craft a malicious request to the NET API that leverages the SSH client functionality to inject commands. [1] [2]
Impact
Successful exploitation enables an unauthenticated remote attacker to execute arbitrary code on the salt-api host. This can lead to full compromise of the server, including data exfiltration, installation of backdoors, or lateral movement within the network. [1] [2]
Mitigation
SaltStack addressed this vulnerability in a later release. Users are strongly advised to upgrade to a patched version of Salt (post-2019.2.0). The official advisory from Ubuntu (USN-4459-1) lists the fix among several other security updates. [2] A workaround is to disable the SSH client in the NET API configuration if upgrading is not immediately possible, though upgrading is the recommended course of action.
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
saltPyPI | < 2019.2.3 | 2019.2.3 |
Affected products
15- SaltStack/Saltdescription
- ghsa-coords14 versionspkg:pypi/saltpkg:rpm/opensuse/salt&distro=openSUSE%20Leap%2015.1pkg:rpm/suse/salt&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-ESPOSpkg:rpm/suse/salt&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-LTSSpkg:rpm/suse/salt&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Advanced%20Systems%20Management%2012pkg:rpm/suse/salt&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP1pkg:rpm/suse/salt&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Python%202%2015%20SP1pkg:rpm/suse/salt&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP1pkg:rpm/suse/salt&distro=SUSE%20Linux%20Enterprise%20Point%20of%20Sale%2012%20SP2pkg:rpm/suse/salt&distro=SUSE%20Linux%20Enterprise%20Server%2015-LTSSpkg:rpm/suse/salt&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015pkg:rpm/suse/salt&distro=SUSE%20Manager%20Client%20Tools%2012pkg:rpm/suse/salt&distro=SUSE%20Manager%20Proxy%203.2pkg:rpm/suse/salt&distro=SUSE%20Manager%20Server%203.2
< 2019.2.3+ 13 more
- (no CPE)range: < 2019.2.3
- (no CPE)range: < 2019.2.0-lp151.5.12.1
- (no CPE)range: < 2019.2.0-5.64.1
- (no CPE)range: < 2019.2.0-5.64.1
- (no CPE)range: < 2019.2.0-46.88.1
- (no CPE)range: < 2019.2.0-6.24.1
- (no CPE)range: < 2019.2.0-6.24.1
- (no CPE)range: < 2019.2.0-6.24.1
- (no CPE)range: < 2019.2.0-46.88.1
- (no CPE)range: < 2019.2.0-5.64.1
- (no CPE)range: < 2019.2.0-5.64.1
- (no CPE)range: < 2019.2.0-46.88.1
- (no CPE)range: < 2019.2.0-46.88.1
- (no CPE)range: < 2019.2.0-46.88.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
9- lists.opensuse.org/opensuse-security-announce/2020-03/msg00026.htmlghsavendor-advisoryx_refsource_SUSEWEB
- github.com/advisories/GHSA-q53j-p6r2-g2v4ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2019-17361ghsaADVISORY
- usn.ubuntu.com/4459-1/mitrevendor-advisoryx_refsource_UBUNTU
- www.debian.org/security/2020/dsa-4676ghsavendor-advisoryx_refsource_DEBIANWEB
- docs.saltstack.com/en/latest/topics/releases/2019.2.3.htmlghsax_refsource_CONFIRMWEB
- github.com/pypa/advisory-database/tree/main/vulns/salt/PYSEC-2020-177.yamlghsaWEB
- github.com/saltstack/salt/commits/mastermitrex_refsource_MISC
- usn.ubuntu.com/4459-1ghsaWEB
News mentions
0No linked articles in our index yet.