An issue was discovered in SaltStack Salt through 3002. Sending crafted web requests to the Salt API, with the SSH client enabled, can result in shell injection.
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "ubuntu_priority": "high", "binaries": [ { "salt-cloud": "2015.8.8+ds-1ubuntu0.1+esm2", "salt-common": "2015.8.8+ds-1ubuntu0.1+esm2", "salt-syndic": "2015.8.8+ds-1ubuntu0.1+esm2", "salt-ssh": "2015.8.8+ds-1ubuntu0.1+esm2", "salt-master": "2015.8.8+ds-1ubuntu0.1+esm2", "salt-doc": "2015.8.8+ds-1ubuntu0.1+esm2", "salt-api": "2015.8.8+ds-1ubuntu0.1+esm2", "salt-minion": "2015.8.8+ds-1ubuntu0.1+esm2", "salt-proxy": "2015.8.8+ds-1ubuntu0.1+esm2" } ] }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "ubuntu_priority": "high", "binaries": [ { "salt-cloud": "2017.7.4+dfsg1-1ubuntu18.04.2+esm1", "salt-common": "2017.7.4+dfsg1-1ubuntu18.04.2+esm1", "salt-syndic": "2017.7.4+dfsg1-1ubuntu18.04.2+esm1", "salt-ssh": "2017.7.4+dfsg1-1ubuntu18.04.2+esm1", "salt-master": "2017.7.4+dfsg1-1ubuntu18.04.2+esm1", "salt-doc": "2017.7.4+dfsg1-1ubuntu18.04.2+esm1", "salt-api": "2017.7.4+dfsg1-1ubuntu18.04.2+esm1", "salt-minion": "2017.7.4+dfsg1-1ubuntu18.04.2+esm1", "salt-proxy": "2017.7.4+dfsg1-1ubuntu18.04.2+esm1" } ] }