// For flags

CVE-2024-38824

CVE-2024-38824 salt advisory

Severity Score

9.6
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track*
*SSVC
Descriptions

Directory traversal vulnerability in recv_file method allows arbitrary files to be written to the master cache directory.

This update for salt fixes the following issues. Fixed Minion token validation. Fixed server vulnerability to replay attacks when not using a TLS encrypted transport. Fixed directory traversal vulnerability in recv_file method. Fixed salt.auth.pki module authentication issue. Fixed arbitrary directory creation or file deletion with GitFS Fixed Minion event bus authorization bypass. Fixed the use of un-validated input in the VirtKey class. Fixed exploitation of the 'on demand' pillar functionality. Fixed the master's default cache vulnerability to a directory traversal attack. Fixed the arbitrary event injection on the Salt Master. Fixed a Denial of Service vulnerability through file read operation. Fixed a Denial of Service vulnerability in Tornado logging behavior Other bugs fixed. Added subsystem filter to udev.exportdb. Fixed Ubuntu 24.04 test failures. Fixed refresh of osrelease and related grains on Python 3.10+ Fixed issue requiring proper Python flavor for dependencies.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
None
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
Complete
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Track*
Exploitation
None
Automatable
No
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2024-06-19 CVE Reserved
  • 2025-06-13 CVE Published
  • 2025-06-16 CVE Updated
  • 2025-08-20 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Saltstack
Search vendor "Saltstack"
Salt
Search vendor "Saltstack" for product "Salt"
*-
Affected
Fedoraproject
Search vendor "Fedoraproject"
Fedora
Search vendor "Fedoraproject" for product "Fedora"
*-
Affected