VYPR
Critical severityNVD Advisory· Published Jan 17, 2020· Updated Aug 5, 2024

CVE-2019-17361

CVE-2019-17361

Description

In SaltStack Salt through 2019.2.0, the salt-api NET API with the ssh client enabled is vulnerable to command injection. This allows an unauthenticated attacker with network access to the API endpoint to execute arbitrary code on the salt-api host.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

An unauthenticated command injection in Salt's salt-api NET SSH endpoint allows arbitrary code execution on the host, fixed in later releases.

Vulnerability

Overview

CVE-2019-17361 is a command injection vulnerability in the salt-api NET API of SaltStack Salt, affecting versions through 2019.2.0. The flaw exists when the SSH client is enabled; the API endpoint fails to properly sanitize user-supplied input, allowing an attacker to inject arbitrary operating system commands. [1] [2]

Exploitation

Prerequisites

The vulnerability can be exploited remotely without authentication, provided the attacker has network access to the salt-api endpoint. No prior credentials or special privileges are required. The attacker only needs to craft a malicious request to the NET API that leverages the SSH client functionality to inject commands. [1] [2]

Impact

Successful exploitation enables an unauthenticated remote attacker to execute arbitrary code on the salt-api host. This can lead to full compromise of the server, including data exfiltration, installation of backdoors, or lateral movement within the network. [1] [2]

Mitigation

SaltStack addressed this vulnerability in a later release. Users are strongly advised to upgrade to a patched version of Salt (post-2019.2.0). The official advisory from Ubuntu (USN-4459-1) lists the fix among several other security updates. [2] A workaround is to disable the SSH client in the NET API configuration if upgrading is not immediately possible, though upgrading is the recommended course of action.

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
saltPyPI
< 2019.2.32019.2.3

Affected products

15

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

9

News mentions

0

No linked articles in our index yet.