Safety vulnerability ID: 65958
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Affected versions of Salt are vulnerable to a Path Traversal vulnerability. A specially crafted URL can be created which leads to a directory traversal in the salt file server. A malicious user can read an arbitrary file from a Salt master’s filesystem.
Latest version: 3007.1
Portable, distributed, remote execution and configuration management system
========================
Security
--------
- Fix CVE-2024-22231 Prevent directory traversal when creating syndic cache directory on the master.
- Fix CVE-2024-22232 Prevent directory traversal attacks in the master's serve_file method.
These vulnerablities were discovered and reported by:
Yudi Zhao(Huawei Nebula Security Lab),Chenwei Jiang(Huawei Nebula Security Lab) (565)
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application