CVE-2024-38824
CVE-2024-38824 salt advisory
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Directory traversal vulnerability in recv_file method allows arbitrary files to be written to the master cache directory.
This update for salt fixes the following issues. Fixed Minion token validation. Fixed server vulnerability to replay attacks when not using a TLS encrypted transport. Fixed directory traversal vulnerability in recv_file method. Fixed salt.auth.pki module authentication issue. Fixed arbitrary directory creation or file deletion with GitFS Fixed Minion event bus authorization bypass. Fixed the use of un-validated input in the VirtKey class. Fixed exploitation of the 'on demand' pillar functionality. Fixed the master's default cache vulnerability to a directory traversal attack. Fixed the arbitrary event injection on the Salt Master. Fixed a Denial of Service vulnerability through file read operation. Fixed a Denial of Service vulnerability in Tornado logging behavior Other bugs fixed. Added subsystem filter to udev.exportdb. Fixed Ubuntu 24.04 test failures. Fixed refresh of osrelease and related grains on Python 3.10+ Fixed issue requiring proper Python flavor for dependencies.
CVSS Scores
SSVC
- Decision:Track*
Timeline
- 2024-06-19 CVE Reserved
- 2025-06-13 CVE Published
- 2025-06-16 CVE Updated
- 2025-08-20 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
https://docs.saltproject.io/en/3006/topics/releases/3006.12.html | ||
https://docs.saltproject.io/en/3007/topics/releases/3007.4.html |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Saltstack Search vendor "Saltstack" | Salt Search vendor "Saltstack" for product "Salt" | * | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | * | - |
Affected
|