Lucene search

K
cve[email protected]CVE-2024-22232
HistoryJun 27, 2024 - 7:15 a.m.

CVE-2024-22232

2024-06-2707:15:54
web.nvd.nist.gov
33
candidate reserved organization individual nvd

7.7 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N

7.3 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

A specially crafted url can be created which leads to a directory traversal in the salt file server.
A malicious user can read an arbitrary file from a Salt master’s filesystem.

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "packageName": "Saltproject",
    "product": "Salt Project",
    "vendor": "VMware",
    "versions": [
      {
        "lessThan": "3005.5, 3006.6",
        "status": "affected",
        "version": "0",
        "versionType": "3005.5, 3006.6"
      }
    ]
  }
]

7.7 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N

7.3 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%