Salt's junos execution module contained an unsafe YAML decode/load usage. A specially crafted YAML payload processed by the junos module could lead to unintended code execution under the context of the Salt process.
{
"binaries": [
{
"binary_version": "3004.1+dfsg-2",
"binary_name": "salt-api"
},
{
"binary_version": "3004.1+dfsg-2",
"binary_name": "salt-cloud"
},
{
"binary_version": "3004.1+dfsg-2",
"binary_name": "salt-common"
},
{
"binary_version": "3004.1+dfsg-2",
"binary_name": "salt-master"
},
{
"binary_version": "3004.1+dfsg-2",
"binary_name": "salt-minion"
},
{
"binary_version": "3004.1+dfsg-2",
"binary_name": "salt-proxy"
},
{
"binary_version": "3004.1+dfsg-2",
"binary_name": "salt-ssh"
},
{
"binary_version": "3004.1+dfsg-2",
"binary_name": "salt-syndic"
}
]
}