Lucene search

K
githubGitHub Advisory DatabaseGHSA-2QW3-2WV6-P64X
HistoryJun 27, 2024 - 9:30 a.m.

Path traversal in saltstack

2024-06-2709:30:39
CWE-22
GitHub Advisory Database
github.com
2
path traversal
saltstack
directory traversal
file server
malicious user
arbitrary file
master's filesystem.

7.7 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N

6.6 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.1%

A specially crafted url can be created which leads to a directory traversal in the salt file server.
A malicious user can read an arbitrary file from a Salt master’s filesystem.

Affected configurations

Vulners
Node
saltstacksaltRange<3006.6
OR
saltstacksaltRange<3005.5
CPENameOperatorVersion
saltlt3006.6
saltlt3005.5

7.7 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N

6.6 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.1%