An issue was discovered in SaltStack Salt through 3002. Sending crafted web requests to the Salt API, with the SSH client enabled, can result in shell injection.
References
Link Providers
https://www.spirityenterprise.com/pentest spirity
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00029.html cve-icon cve-icon
http://packetstormsecurity.com/files/160039/SaltStack-Salt-REST-API-Arbitrary-Command-Execution.html cve-icon cve-icon
https://docs.saltstack.com/en/latest/topics/releases/2019.2.6.html cve-icon
https://docs.saltstack.com/en/latest/topics/releases/3000.4.html cve-icon
https://docs.saltstack.com/en/latest/topics/releases/3001.2.html cve-icon
https://docs.saltstack.com/en/latest/topics/releases/3002.1.html cve-icon
https://github.com/saltstack/salt/releases cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2020/12/msg00007.html cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2022/01/msg00000.html cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TPOGB2F6XUAIGFDTOCQDNB2VIXFXHWMA/ cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2020-16846 cve-icon
https://security.gentoo.org/glsa/202011-13 cve-icon cve-icon
https://www.cisa.gov/known-exploited-vulnerabilities-catalog cve-icon
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-16846 cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2020-16846 cve-icon
https://www.debian.org/security/2021/dsa-4837 cve-icon cve-icon
https://www.saltstack.com/blog/on-november-3-2020-saltstack-publicly-disclosed-three-new-cves/ cve-icon cve-icon cve-icon
https://www.zerodayinitiative.com/advisories/ZDI-20-1379/ cve-icon cve-icon
https://www.zerodayinitiative.com/advisories/ZDI-20-1380/ cve-icon cve-icon
https://www.zerodayinitiative.com/advisories/ZDI-20-1381/ cve-icon cve-icon
https://www.zerodayinitiative.com/advisories/ZDI-20-1382/ cve-icon cve-icon
https://www.zerodayinitiative.com/advisories/ZDI-20-1383/ cve-icon cve-icon
History

Wed, 22 Oct 2025 00:30:00 +0000


Tue, 21 Oct 2025 20:30:00 +0000


Tue, 21 Oct 2025 19:30:00 +0000


Fri, 07 Feb 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics kev

{'dateAdded': '2021-11-03'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'active', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 06 Feb 2025 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Opensuse
Opensuse leap
CPEs cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
Vendors & Products Opensuse
Opensuse leap

Wed, 14 Aug 2024 00:45:00 +0000

Type Values Removed Values Added
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-10-21T23:35:33.124Z

Reserved: 2020-08-04T00:00:00.000Z

Link: CVE-2020-16846

cve-icon Vulnrichment

Updated: 2024-08-04T13:45:33.237Z

cve-icon NVD

Status : Analyzed

Published: 2020-11-06T08:15:13.283

Modified: 2025-11-07T19:32:05.420

Link: CVE-2020-16846

cve-icon Redhat

Severity : Important

Publid Date: 2020-11-03T00:00:00Z

Links: CVE-2020-16846 - Bugzilla