ArchLinux: 202001-7: salt: arbitrary command execution
Summary
With the Salt NetAPI enabled in addition to having a SSH roster defined, unauthenticated access is possible when specifying the client as SSH. Additionally, when the raw_shell option is specified any arbitrary command may be run on the Salt master when specifying SSH options.
Resolution
Upgrade to 2019.2.3-1.
# pacman -Syu "salt>=2019.2.3-1"
The problem has been fixed upstream in version 2019.2.3.
References
https://docs.saltproject.io/en/latest/topics/releases/2019.2.3.html https://github.com/saltstack/salt/commit/bca115f3f00fbde564dd2f12bf036b5d2fd08387 https://security.archlinux.org/CVE-2019-17361
Workaround
None.