Salt junos module uses an unsafe YAML loader which may allow unintended code execution
Salt's junos execution module contained an unsafe YAML decode/load usage. A specially crafted YAML payload processed by the junos module could lead to unintended code execution under the context of the Salt process.
Upgrade Salt to a release that includes the Junos module YAML loader fix (e.g., Salt 3006.17 or later for the 3006 LTS line). For distro-packaged builds, install the vendor-provided fixed package version (for example Alpine salt-lts 3006.17-r0 or higher).
Configurations
Workarounds
If upgrading immediately is not possible, reduce exposure by restricting which users/automation can invoke junos execution module functions and by limiting access to any YAML inputs used by the junos module. Prefer trusted sources only for YAML content.