PyPi: Salt

CVE-2024-22232

Safety vulnerability ID: 65958

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at Jun 27, 2024 Updated at Nov 05, 2024
Scan your Python projects for vulnerabilities →

Advisory

Affected versions of Salt are vulnerable to a Path Traversal vulnerability. A specially crafted URL can be created which leads to a directory traversal in the salt file server. A malicious user can read an arbitrary file from a Salt master’s filesystem.

Affected package

salt

Latest version: 3007.1

Portable, distributed, remote execution and configuration management system

Affected versions

Fixed versions

Vulnerability changelog

========================

Security
--------

- Fix CVE-2024-22231 Prevent directory traversal when creating syndic cache directory on the master.
- Fix CVE-2024-22232 Prevent directory traversal attacks in the master's serve_file method.

These vulnerablities were discovered and reported by:
Yudi Zhao(Huawei Nebula Security Lab),Chenwei Jiang(Huawei Nebula Security Lab) (565)

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application