Debian DSA-4676-1 : salt - security update

critical Nessus Plugin ID 136372


The remote Debian host is missing a security-related update.


Several vulnerabilities were discovered in salt, a powerful remote execution manager, which could result in retrieve of user tokens from the salt master, execution of arbitrary commands on salt minions, arbitrary directory access to authenticated users or arbitrary code execution on salt-api hosts.


Upgrade the salt packages.

For the oldstable distribution (stretch), these problems have been fixed in version 2016.11.2+ds-1+deb9u3.

For the stable distribution (buster), these problems have been fixed in version 2018.3.4+dfsg1-6+deb10u1.

See Also

Plugin Details

Severity: Critical

ID: 136372

File Name: debian_DSA-4676.nasl

Version: 1.10

Type: local

Agent: unix

Published: 5/7/2020

Updated: 8/16/2022

Supported Sensors: Agentless Assessment, Frictionless Assessment Agent, Nessus Agent

Risk Information


Risk Factor: Critical

Score: 9.2


Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: E:H/RL:OF/RC:C

CVSS Score Source: CVE-2020-11651


Risk Factor: Critical

Base Score: 9.8

Temporal Score: 9.4

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: E:H/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:salt, cpe:/o:debian:debian_linux:10.0, cpe:/o:debian:debian_linux:9.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 5/6/2020

Vulnerability Publication Date: 1/17/2020

CISA Known Exploited Dates: 5/3/2022

Exploitable With


Metasploit (SaltStack Salt Master/Minion Unauthenticated RCE)

Reference Information

CVE: CVE-2019-17361, CVE-2020-11651, CVE-2020-11652

DSA: 4676

IAVA: 2020-A-0195-S