CVE-2024-22232

A specially crafted url can be created which leads to a directory traversal in the salt file server. A malicious user can read an arbitrary file from a Salt master’s filesystem.
Configurations

No configuration.

History

21 Nov 2024, 08:55

Type Values Removed Values Added
References () https://saltproject.io/security-announcements/2024-01-31-advisory/ - () https://saltproject.io/security-announcements/2024-01-31-advisory/ -

05 Nov 2024, 16:35

Type Values Removed Values Added
CWE CWE-22

27 Jun 2024, 12:47

Type Values Removed Values Added
Summary
  • (es) Se puede crear una URL especialmente manipulada que conduzca a directory traversal en el servidor de archivos salt. Un usuario malintencionado puede leer un archivo arbitrario del sistema de archivos de un maestro Salt.

27 Jun 2024, 07:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-27 07:15

Updated : 2024-11-21 08:55


NVD link : CVE-2024-22232

Mitre link : CVE-2024-22232

CVE.ORG link : CVE-2024-22232


JSON object : View

Products Affected

No product.

CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')