CVE-2024-22232 – salt
Package
Manager: pip
Name: salt
Vulnerable Version: >=0 <3005.5 || >=3006.0 <3006.6
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00332 pctl0.55467
Details
Path traversal in saltstack A specially crafted url can be created which leads to a directory traversal in the salt file server. A malicious user can read an arbitrary file from a Salt master’s filesystem.
Metadata
Created: 2024-06-27T09:30:39Z
Modified: 2024-06-27T17:48:29Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/06/GHSA-2qw3-2wv6-p64x/GHSA-2qw3-2wv6-p64x.json
CWE IDs: ["CWE-22"]
Alternative ID: GHSA-2qw3-2wv6-p64x
Finding: F063
Auto approve: 1