First published: Thu Jun 27 2024(Updated: )
A specially crafted url can be created which leads to a directory traversal in the salt file server.
Credit: security@vmware.com security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/salt | >=3006.0<3006.6 | 3006.6 |
pip/salt | <3005.5 | 3005.5 |
<3005.5<3006.6 | 3005.5 3006.6 |
Upgrade Salt masters to 3005.5 or 3006.6
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-22232 is categorized as a critical vulnerability due to the potential for arbitrary file reads from the filesystem.
To mitigate CVE-2024-22232, upgrade to Salt version 3006.6 or 3005.5 as soon as possible.
CVE-2024-22232 affects Salt versions between 3006.0 and 3006.6, as well as all versions up to 3005.5.
Yes, CVE-2024-22232 could enable a malicious user to read any file on the Salt master’s filesystem.
Currently, the best approach is to upgrade to the fixed versions, as no official workaround has been provided.